Showing 81 - 100 results of 215 for search '"Attacker"', query time: 0.04s Refine Results
  1. 81
    by Nematollahi, Mohammad Ali
    Published 2015
    ...) and Lifting Wavelet Transform (LWT) with SVD, against different attacks such as filtering, additive noise...
    Get full text
    Thesis
  2. 82
    by Tanha, Maryam
    Published 2013
    ... automatic response and self-healing capabilities to handle multifarious malicious attacks while remaining...
    Get full text
    Thesis
  3. 83
    by Salem Hussin, Saleh Hussin
    Published 2005
    ... message. Image is the watermark channel or carrier. Image pixels and possible attacks on marked image...
    Get full text
    Thesis
  4. 84
    ... to learn systems’ specifications and extract general state-based rules for attacks identification...
    Get full text
    Thesis
  5. 85
    by Abdul Wahid, Mohammed N.
    Published 2016
    ... transmitted on high speed communications links for errors and attackers’ detection and signal integrity...
    Get full text
    Thesis
  6. 86
    by Mohd Nasir, Rinie Narinie
    Published 2015
    ... (PNS) attack compared to Bennet and Brassard 1984 (BB84) protocol. It is more likely...
    Get full text
    Thesis
  7. 87
    by Che Yusof, Nik Syamsul Bahari
    Published 2014
    ... as the violent and critical attacks by cavitation can cause a lot of damage to ball valves. The damage in term...
    Get full text
    Thesis
  8. 88
    by Liew, Jiun Terng
    Published 2019
    ... card used also raises the concern of resources availability due to selfish attack. Therefore, work...
    Get full text
    Thesis
  9. 89
    by Ariffin, Suriyani
    Published 2012
    ... of differential and linear attacks. There are no three-round linear trails with predictable input-output...
    Get full text
    Thesis
  10. 90
    by Tuan Yusof, Tuan Norizan
    Published 2018
    ...Green leafhopper (GLH), nephotettix virescens is one of the insects that attacks paddy plants...
    Get full text
    Thesis
  11. 91
    by Jamal, Fara
    Published 2021
    ... a security attack. Also, user attributes are stored in the block storage using an InterPlanetary...
    Get full text
    Thesis
  12. 92
    by Asbullah, Muhammad Asyraf
    Published 2015
    ... security goal and the strong attack model, namely the indistinguishability and the chosen-ciphertext attack...
    Get full text
    Thesis
  13. 93
    by Mohamed, Kartini
    Published 2017
    ... and protect the system from several attacks such as brute force and tampering attacks. Therefore, the use...
    Get full text
    Thesis
  14. 94
    ... of the malicious attackers to violate the security and privacy by spreading malicious codes over a wider range...
    Get full text
    Thesis
  15. 95
    by Md Salim, Rafidah
    Published 2008
    ... attacks. Heat treatment is one of the potential treatments to enhance the durability of bamboo...
    Get full text
    Thesis
  16. 96
    by Buhari, Abudhahir
    Published 2015
    ... attacks However, this scheme requires noiseless quantum channel in order to detect the insider...
    Get full text
    Thesis
  17. 97
    by Tuama, Ammar Yaseen
    Published 2016
    ... of an Elliptic Curve equation. In terms of security, the proposed solution is studied against brute-force attacks...
    Get full text
    Thesis
  18. 98
    by Tan, Li Peng
    Published 2014
    ... and Thailand attacking plants form the genus Ocimum, herein its common name, ocimum tingid. Cochlochila bullita...
    Get full text
    Thesis
  19. 99
    by Kojouri, Samira Jilani
    Published 2016
    ..., sulfate attack and drying shrinkage were conducted at late ages up to six months. The SEM, XRD, FTIR, TGA...
    Get full text
    Thesis
  20. 100
    by Lee, Soon Heng
    Published 2015
    ... in controlling termite attacks. Therefore, further studied had been carry out using OPT and Rubberwood...
    Get full text
    Thesis