Showing 1 - 20 results of 78 for search '"Attacker"', query time: 0.04s Refine Results
  1. 1
    ... building. Amongst the common conservation problems of heritage buildings, salt attack and rising damp...
    Get full text
    Thesis
  2. 2
    by Elejla, Omar E. O.
    Published 2018
    ... in IPv6 native networks. IPv6 is vulnerable to a number of attacks from IPv4, besides new attacks have...
    Get full text
    Thesis
  3. 3
    by Omar, Mohd Nizam
    Published 2011
    ... to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation...
    Get full text
    Thesis
  4. 4
    by Ghaben, Ayman Ibrahim Ali
    Published 2023
    ...This thesis proposes an approach to detect HTTP flooding DDoS attacks on web servers. The proposed...
    Get full text
    Thesis
  5. 5
    ...The goal of the thesis is to propose an approach that can detect flash crowd attacks that target...
    Get full text
    Thesis
  6. 6
    by Mosa, Mohammad Rasmi Hassun
    Published 2013
    ... to reconstruct attack intentions and estimate similar attack strategies. The intentions are identified through a...
    Get full text
    Thesis
  7. 7
    by Mohammed Ahmed Saad, Redhwan
    Published 2016
    ..., in which ICMP can be blocked or dropped. ICMPv6 opens the door for attackers to attack IPv6 networks...
    Get full text
    Thesis
  8. 8
  9. 9
    ... technology is not free from new security concerns. The Distributed Denial of Service (DDoS) attack is one...
    Get full text
    Thesis
  10. 10
    by C. Arjuman, Navaneethan
    Published 2021
    ... flaw within RD protocol has led to Fake RA attacks. Studies shows that the standard RD protocol...
    Get full text
    Thesis
  11. 11
    by Ibrahim Al-Ani, Ahmed Khallel
    Published 2020
    ... aims to prevent a DoS attack during the DAD process by designing a rule-based mechanism. The proposed...
    Get full text
    Thesis
  12. 12
  13. 13
    by Cheng, Han Pin
    Published 2008
    ... menjanakan banyak sambungan palsu terhadap pelayan tersebut. Naptha attack aims to disrupt TCP service a...
    Get full text
    Thesis
  14. 14
    by Omolara, Abiodun Esther
    Published 2020
    ... scheme to address brute-force attacks specifically in the context of password-based encryption systems...
    Get full text
    Thesis
  15. 15
    by Laghari, Shams Ul Arfeen
    Published 2023
    ..., and protection against cyber-attacks. The proposed mechanism is compared with the standard SECS/GEM, Secured SECS...
    Get full text
    Thesis
  16. 16
    by Ali Mohamed, Nachaat Abdelatif
    Published 2022
    ... organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent...
    Get full text
    Thesis
  17. 17
    by Yunanto, Sri
    Published 2013
    ...This thesis attempts to analyze the involvement of militant Islamist groups in terror attacks...
    Get full text
    Thesis
  18. 18
    by Eid, Almazrooie Mishal
    Published 2018
    ...Asymmetric and symmetric cryptography are believed to be secure against any attack using classical...
    Get full text
    Thesis
  19. 19
    by Chong , Chuong Leong
    Published 2011
    ... power at a rotational speed of 300rpm. Wind turbine is investigated as a function of angle of attack...
    Get full text
    Thesis
  20. 20
    by Ibrahim, Ayman Khallel
    Published 2020
    ... making it vulnerable to various threats, such as rogue DHCPv6 server attack and passive attack. Two well...
    Get full text
    Thesis