Showing 1 - 20 results of 132 for search '"Attacker"', query time: 0.04s Refine Results
  1. 1
    by Mohd Jaafar, Fatin Haziqah
    Published 2013
    ...This study is about termite attack at historical building, where it is involves a conservation work...
    Get full text
    Thesis
  2. 2
    by Azali, Muhamad Rizal
    Published 2005
    ...This project is using a honeypot as a tool to detect internal network attack at Faculty...
    Get full text
    Thesis
  3. 3
    by Roslan, Fairuzan
    Published 2004
    ... of the greatest problems the security community faces is lack of information on the attacker. This is one...
    Get full text
    Thesis
  4. 4
    by Harun, Zati Bayani
    Published 2019
    ... (DDoS) attack which is jamming attack. Almost 81% of jamming attacks are initiated at the MAC layer due...
    Get full text
    Thesis
  5. 5
    by Nordin, Norfarina
    Published 2020
    ...The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has...
    Get full text
    Thesis
  6. 6
    by Mohd Fauzi, Shukor Sanim
    Published 2003
    ... of computer viruses, Trojan horses, worms, and other malicious codes. Computer viruses attacks are problems...
    Get full text
    Thesis
  7. 7
    by Yusri, Muhammad Syamil
    Published 2024
    ...DDoS attacks represent a substantial danger to network availability and security. Because...
    Get full text
    Thesis
  8. 8
    by Md Ilyas, Siti Sarah
    Published 2017
    ...The number of phishing attacks involving online banking has records an increase percentage over...
    Get full text
    Thesis
  9. 9
    ... of attackers which publicly embarrasses the victim by sharing some personal information of the victim...
    Get full text
    Thesis
  10. 10
    by Hussein, Safwan Mawlood
    Published 2012
    ...The vast amount of attacks over the Internet makes the computer users and many organizations under...
    Get full text
    Thesis
  11. 11
    by Mohamad Alias, Mohd Azuan
    Published 2012
    ...Port knocking is technique first introduce in the Black Hat to prevent attackers from discovering...
    Get full text
    Thesis
  12. 12
    ... password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without...
    Get full text
    Thesis
  13. 13
    by Marbukhari, Norhaflyza
    Published 2018
    ... remotely and unattended has exposed itself to node impersonation attack. This kind of attack can be further...
    Get full text
    Thesis
  14. 14
    by Ahmad, Zaid
    Published 2014
    .... Unfortunately, the AODV protocol is vulnerable to attacks due to the lack of security. Among various kinds...
    Get full text
    Thesis
  15. 15
    ... of network intrusion attacks, particularly Remote to Local (R2L) attacks. The problem statement underscores...
    Get full text
    Thesis
  16. 16
    by Daim, Siti Baroroh
    Published 2019
    ... of this research is to analyze chronology of Bukit Kepong Police Station attack using 3D model of Bukit Kepong...
    Get full text
    Thesis
  17. 17
  18. 18
    by Abdul Rahman, Muhamad Nazri
    Published 2002
    ... Center (WTC) Attack: Its Impact to the Kuala Lumpur Stock Exchange (KLSE) and Malaysia Foreign Exchange...
    Get full text
    Thesis
  19. 19
    by Mohd Yusof, Mohd Azahari
    Published 2019
    ...DDoS attacks are one of the most serious threats nowadays. It is an attack launched by an attacker...
    Get full text
    Thesis
  20. 20
    by Sapri, Nurnadia
    Published 2015
    ..., it is unsecure because the attacker can break security parameters to obtain access to the data that currently...
    Get full text
    Thesis