-
1by Haron, Haliza“... to the attackers. This study will focus on jamming attack and the case study has been done at Kolej Komuniti Masjid...”
Published 2015
Get full text
Get full text
Thesis -
2by Abdollah, Mohd Faizal“... transaction. They have also become the main mean to attack host. The popularity of intrusion tools and script...”
Published 2009
Get full text
Get full text
Thesis -
3by Mohd Salleh, Nurhashikin“... uses the Internet as their platform to form online communities and launch their attack...”
Published 2018
Get full text
Get full text
Thesis -
4by Salih Ali, Nabeel“... applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique...”
Published 2015
Get full text
Get full text
Thesis -
5by Mohd Foozy, Cik Feresa“... the framework for a single attack detection for Spam has been studied. Phishing has never been studied. Existing...”
Published 2017
Get full text
Get full text
Thesis -
6by Halizah, Saad“... of Android design also become it flaw because it not only attract Android user but also attacker for Android...”
Published 2013
Get full text
Get full text
Thesis -
7by Abdul Mubin, Norzul Masri“.... Mobile device are the main devices that can be manipulates by the attacker towards their victims...”
Published 2017
Get full text
Get full text
Thesis -
8by Hirzan, Alauddin Maulana“... to allow transmission. Attacker from IPv6 network can use this tunneling mechanism to send intrusion...”
Published 2017
Get full text
Get full text
Thesis -
9by Abdullah, Raihana Syahirah“...Botnets is a tool for high-profile cyber-attack. It is a collection of compromised computer...”
Published 2016
Get full text
Get full text
Thesis -
10by Buja, Alya Geogiana“... of block ciphers against side-channel cube attack and differential fault analysis.Thirdly,all proposed...”
Published 2018
Get full text
Get full text
Thesis -
11by Pang, Kok An“... against side channel cube attack is also presented in this thesis. For most of the secret keys, by reading...”
Published 2021
Get full text
Get full text
Thesis -
12by Noor Zuraidin, Mohd Safar“... anomalies are identified, abnormal DNS packet request, the NetBIOS attack, abnormal DNS MX query, DNS...”
Published 2011
Get full text
Get full text
Thesis -
13
-
14by Ahmad, Nazrul Muhaimin“... rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To...”
Published 2018
Get full text
Get full text
Thesis -
15by Abdullah, Ahmad Shafawi“.... It was observed that bio mimetic design generated 50% more lift at 10° angle of attack compare to same profile...”
Published 2019
Get full text
Get full text
Thesis -
16by Jamal, Zalifh“... in 2013 reached 600 million, and has grown rapidly in recent years. Malware can attack a wide variety...”
Published 2017
Get full text
Get full text
Thesis -
17by Suziee, Sukarti“... of corrosion attack has also been discussed on the basis of the morphology and the content properties...”
Published 2013
Get full text
Get full text
Thesis -
18by Mohammad, Nur Ameera Natasha“... their attacks. This is with a view of fact that an email becomes one of the primary targets of an internal...”
Published 2022
Get full text
Get full text
Thesis -
19by Jaber, Mustafa Musa“... that caused cannot stop and prevent the attacks of terrorist. Recently, a prevalent relationship between...”
Published 2016
Get full text
Get full text
Thesis -
20by Abbas, Thamer J.“... that did not prevent the terrorist attacks. Recently, a prevalent relationship between information sharing...”
Published 2017
Get full text
Get full text
Thesis