Showing 1 - 20 results of 246 for search '"Attacker"', query time: 0.03s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
    by Chan, Kah Wai
    Published 2021
    ...The concrete structures subject to aggressive environment under sulphate attack is of key...
    Get full text
    Thesis
  6. 6
    by Mohd. Ghazzali, Amalina
    Published 2008
    ...This study of web worms attack on web application can be implemented to enhance the security...
    Get full text
    Thesis
  7. 7
  8. 8
    ...Plaintext Recovery Attack is a new attack in security system world. It was discovered lately...
    Get full text
    Thesis
  9. 9
    by Sanaei, Mojtaba Ghanaatpisheh
    Published 2013
    ..., selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One...
    Get full text
    Thesis
  10. 10
    by Khan, Muhammad Murad
    Published 2013
    ... In The Middle can observe key exchange messages and can setup MITM attack between communication. Security...
    Get full text
    Thesis
  11. 11
    ...Static cyphers use static transformations for encryption and decryption. Therefore, the attacker...
    Get full text
    Thesis
  12. 12
    by Mohamad, Nurul Zawiyah
    Published 2008
    ... to keep sensitive and confidential information. Since SQL injection attacks occurred as a new way...
    Get full text
    Thesis
  13. 13
    ... of more users. Thus, it is vulnerable to a variety of attacks, including denial of service (DoS) which...
    Get full text
    Thesis
  14. 14
    by Modirkhazeni, Ali
    Published 2011
    ... of conventional techniques of attack and the attacks that are not desirable because of limited resources is a...
    Get full text
    Thesis
  15. 15
    ... and attacks on the routing protocols in the MANET. One of the critical threats is the wormhole attacks, which...
    Get full text
    Thesis
  16. 16
    by Jantan, Mohd. Faidzal
    Published 2010
    .... Far from that, Algebraic Attacks and Fast Algebraic Attack has become popular among cryptographers...
    Get full text
    Thesis
  17. 17
  18. 18
    by Abadi, Ahad Akbar
    Published 2013
    ... issues still the considerable difficulties for customers. This means the attacks which can threat...
    Get full text
    Thesis
  19. 19
    by Boroujerdizadeh, Ali
    Published 2013
    .... We narrow down the project to a specific attack. Collusion attack is the main problem for video...
    Get full text
    Thesis
  20. 20
    by Hosseini, Seyed Mostafa Mir
    Published 2013
    ... is going to explore integrity attacks in RFID systems. Even though the previous related works have...
    Get full text
    Thesis