-
1by Siew, Hong Wei“...The main aims of this study are divided into, firstly, a generic model of crosstalk attack and its...”
Published 2013
Thesis -
2by Lim, Boon Ping“...Denial of service (DoS) attacks tie up resources of a remote host or network, thereby denying...”
Published 2006
Thesis -
3by Ali, Sameer“..., it is susceptible to attacker’s Distributed Denial of Service (DDoS) attacks. DDoS attacks are the main causes...”
Published 2021
Thesis -
4by Chong, Siew Chin“... biometric specific threats. There is risk of being compromised by attacker where an attacker might use...”
Published 2005
Thesis -
5by Bashier, Housam Khalifa“... authentication system that is resistant against shoulder-surfing attacks. Hence, in this research work a solution...”
Published 2015
Thesis -
6by Phan, Raphael Chung We“... and illustrate a dedicated attact and impossible differential attack on the AES. We also present our results...”
Published 2002
Thesis -
7by Phan, Raphael Chung Wei“... and illustrate a dedicated attact and impossible differential attack on the AES. We also present our results...”
Published 2002
Thesis -
8by Chan, Gaik Yee“... to address the problems or countermeasure the attacks occurring at the Application Layer. These ID/IP...”
Published 2012
Thesis -
9by Yap, Wun She“... and thus cannot be regarded as an ideal cipher. We also present the first known cryptanalytic attack against...”
Published 2015
Thesis -
10by Chin, Ji Jian“....’s open problem of whether the Beth IBI scheme is secure against active/concurrent attacks and a result...”
Published 2014
Thesis -
11by Behna, Rouzbeh“... addressing the private key escrow problem at the same time. Firstly, two attacks are mounted on an efficient...”
Published 2013
Thesis -
12by Go, Bok Min“... to exploit their special properties/weaknesses to attack public-key-based security protocols....”
Published 2006
Thesis -
13by Kai, Chong Zan“...This thesis presents a robust packet drop attack detection protocol (named as Separation...”
Published 2010
Thesis -
14by Chin, Yong Jian“... such as - higher degree of freedom, less prone to spoof attacks, and lower error rates. In the proposed solution...”
Published 2012
Thesis -
15by Lee, Nicholas Ming Ze“... (NIDS) has since become a significant topic of research. Most network attacks are not caused by a single...”
Published 2019
Thesis -
16by Lee, Sui Ping“..., dedicated for interferometric synthetic aperture radar applications. The proposed algorithm solver attacks...”
Published 2019
Thesis -
17by Hussain, Syed Nazir“... problems due to connection errors, sensor faults, and security attacks. This research addresses the problem...”
Published 2021
Thesis -
18by Mah, Meng Chuan“... to the UAV operation. The wireless communication link can be vulnerable to malicious attacks such as jamming...”
Published 2019
Thesis -
19by Salem, Mohammed Ahmed“... the characteristics of the physical wireless channel to prevent the eavesdropper interruptions and attacks. The use...”
Published 2020
Thesis -
20by Chin, Zi Hau“... to fluctuation of hash rate caused by miners leaving or entering the network such as an attack or sudden events...”
Published 2021
Thesis