-
1
-
2
-
3
-
4
-
5by Chan, Kah Wai“...The concrete structures subject to aggressive environment under sulphate attack is of key...”
Published 2021
Get full text
Thesis -
6by Mohd. Ghazzali, Amalina“...This study of web worms attack on web application can be implemented to enhance the security...”
Published 2008
Get full text
Thesis -
7
-
8by Ahmad Baidowi, Zaid Mujaiyid Putra“...Plaintext Recovery Attack is a new attack in security system world. It was discovered lately...”
Published 2010
Get full text
Thesis -
9by Sanaei, Mojtaba Ghanaatpisheh“..., selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One...”
Published 2013
Get full text
Thesis -
10by Khan, Muhammad Murad“... In The Middle can observe key exchange messages and can setup MITM attack between communication. Security...”
Published 2013
Get full text
Thesis -
11by Abdelgader, Abdelrahman Abdelgader Altigani“...Static cyphers use static transformations for encryption and decryption. Therefore, the attacker...”
Published 2022
Get full text
Thesis -
12by Mohamad, Nurul Zawiyah“... to keep sensitive and confidential information. Since SQL injection attacks occurred as a new way...”
Published 2008
Get full text
Thesis -
13by Al-Hinai, Salim Mohammed Abdullah“... of more users. Thus, it is vulnerable to a variety of attacks, including denial of service (DoS) which...”
Published 2019
Get full text
Thesis -
14by Modirkhazeni, Ali“... of conventional techniques of attack and the attacks that are not desirable because of limited resources is a...”
Published 2011
Get full text
Thesis -
15by Ardestani, Parichehr Manouchehri“... and attacks on the routing protocols in the MANET. One of the critical threats is the wormhole attacks, which...”
Published 2013
Get full text
Thesis -
16by Jantan, Mohd. Faidzal“.... Far from that, Algebraic Attacks and Fast Algebraic Attack has become popular among cryptographers...”
Published 2010
Get full text
Thesis -
17
-
18by Abadi, Ahad Akbar“... issues still the considerable difficulties for customers. This means the attacks which can threat...”
Published 2013
Get full text
Thesis -
19by Boroujerdizadeh, Ali“.... We narrow down the project to a specific attack. Collusion attack is the main problem for video...”
Published 2013
Get full text
Thesis -
20by Hosseini, Seyed Mostafa Mir“... is going to explore integrity attacks in RFID systems. Even though the previous related works have...”
Published 2013
Get full text
Thesis