-
1by Rahman @ Drahman, Haris Fadzilah Abdul“... building. Amongst the common conservation problems of heritage buildings, salt attack and rising damp...”
Published 2011
Get full text
Thesis -
2by Elejla, Omar E. O.“... in IPv6 native networks. IPv6 is vulnerable to a number of attacks from IPv4, besides new attacks have...”
Published 2018
Get full text
Thesis -
3by Omar, Mohd Nizam“... to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation...”
Published 2011
Get full text
Thesis -
4by Ghaben, Ayman Ibrahim Ali“...This thesis proposes an approach to detect HTTP flooding DDoS attacks on web servers. The proposed...”
Published 2023
Get full text
Thesis -
5by Al-Saleem, Samer Abdulsada Mutlag“...The goal of the thesis is to propose an approach that can detect flash crowd attacks that target...”
Published 2017
Get full text
Thesis -
6by Mosa, Mohammad Rasmi Hassun“... to reconstruct attack intentions and estimate similar attack strategies. The intentions are identified through a...”
Published 2013
Get full text
Thesis -
7by Mohammed Ahmed Saad, Redhwan“..., in which ICMP can be blocked or dropped. ICMPv6 opens the door for attackers to attack IPv6 networks...”
Published 2016
Get full text
Thesis -
8
-
9by Aladaileh, Mohammad Adnan Ahmad“... technology is not free from new security concerns. The Distributed Denial of Service (DDoS) attack is one...”
Published 2021
Get full text
Thesis -
10by C. Arjuman, Navaneethan“... flaw within RD protocol has led to Fake RA attacks. Studies shows that the standard RD protocol...”
Published 2021
Get full text
Thesis -
11by Ibrahim Al-Ani, Ahmed Khallel“... aims to prevent a DoS attack during the DAD process by designing a rule-based mechanism. The proposed...”
Published 2020
Get full text
Thesis -
12
-
13by Cheng, Han Pin“... menjanakan banyak sambungan palsu terhadap pelayan tersebut. Naptha attack aims to disrupt TCP service a...”
Published 2008
Get full text
Thesis -
14by Omolara, Abiodun Esther“... scheme to address brute-force attacks specifically in the context of password-based encryption systems...”
Published 2020
Get full text
Thesis -
15by Laghari, Shams Ul Arfeen“..., and protection against cyber-attacks. The proposed mechanism is compared with the standard SECS/GEM, Secured SECS...”
Published 2023
Get full text
Thesis -
16by Ali Mohamed, Nachaat Abdelatif“... organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent...”
Published 2022
Get full text
Thesis -
17by Yunanto, Sri“...This thesis attempts to analyze the involvement of militant Islamist groups in terror attacks...”
Published 2013
Get full text
Thesis -
18by Eid, Almazrooie Mishal“...Asymmetric and symmetric cryptography are believed to be secure against any attack using classical...”
Published 2018
Get full text
Thesis -
19by Chong , Chuong Leong“... power at a rotational speed of 300rpm. Wind turbine is investigated as a function of angle of attack...”
Published 2011
Get full text
Thesis -
20by Ibrahim, Ayman Khallel“... making it vulnerable to various threats, such as rogue DHCPv6 server attack and passive attack. Two well...”
Published 2020
Get full text
Thesis