Showing 1 - 20 results of 24 for search '"Attacker"', query time: 0.04s Refine Results
  1. 1
    by Chai, Jee Sing
    Published 2008
    .... Generally, the schemes in spatial domain are usually less robust to attacks; while the schemes in frequency...
    Get full text
    Thesis
  2. 2
    by Kuhanraj, Balan
    Published 2020
    ... serious network threats such as denial of service attack, data modification attack, impersonation attack...
    Get full text
    Thesis
  3. 3
  4. 4
    by Yasir, Javed
    Published 2020
    ...). Formal and computational analysis of TLwS shows that it can mitigate replay attack, Man-in-the-Middle...
    Get full text
    Thesis
  5. 5
    ... of protocol. The formal analysis of LEMAP proves that it can mitigate replay attack, Man-in-the-Middle (MITM...
    Get full text
    Thesis
  6. 6
  7. 7
    by Ronnie, Ranjit Singh
    Published 2015
    ...The attacks of 9/11 have marked a significant event not only to the US but to the rest of the world...
    Get full text
    Thesis
  8. 8
    by Elfera, Polly
    Published 2016
    ... of Kapur bukit attacked by insect pest. The common leaf damages on Engkabang jantong tree was ‘hole damage...
    Get full text
    Thesis
  9. 9
    by NURFARAHIN, AJLAN
    Published 2022
    ... (Symington) Kosterm, towards fungal decay and termite attack with and without extractives content, (ii...
    Get full text
    Thesis
  10. 10
    by Choo, Jeffrey Soon Fatt
    Published 2015
    ...Phishing attack is a cybercrime which will result in severe financial losses to consumers...
    Get full text
    Thesis
  11. 11
  12. 12
    by Iyus, Yosep
    Published 2021
    ... (46.7%) of nurses reported being verbally abuse, 29.2% claimed to be physically attacked, and 24.2...
    Get full text
    Get full text
    Thesis
  13. 13
    by Nabila, Satibi
    Published 2014
    ....). Various diseases attacked this black pepper but most common disease is root rot caused by Phytophthora...
    Get full text
    Thesis
  14. 14
    by Chanderan, Navein
    Published 2019
    ... of malware are just not enough to combat modern malware attack as it has inherent limitation...
    Get full text
    Thesis
  15. 15
    by Tan, Colin Choon Lin
    Published 2015
    ... highly confidential credentials are requested. To safeguard Internet users against phishing attacks, a...
    Get full text
    Get full text
    Thesis
  16. 16
    by Chang, Ee Hung
    Published 2019
    ... attacks, a hybrid phishing detection method has been proposed. The proposed method utilises logo image...
    Get full text
    Thesis
  17. 17
    by Tan, Colin Choon Lin
    Published 2021
    ... phishing attacks. Mainstream solutions and technical approaches for phishing detection suffer from inherent...
    Get full text
    Thesis
  18. 18
    by Faiezah, Abdullah.
    Published 2009
    ... attacked by any biological degradation agents such as fungi, insects and marine borers. There are several...
    Get full text
    Thesis
  19. 19
    by Jamil, Matarul
    Published 2023
    ... attack problem on reinforced concrete (RC) structures settled under XS3 class exposure by utilising fly...
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20