Showing 1 - 20 results of 150 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1
    ... in an unfriendly environment. Wireless Ad Hoc network might be unprotected against attacks by malicious nodes...
    Get full text
    Get full text
    Thesis
  2. 2
    .... In this dissertation, we consider the use of SSD concepts in the field of backdoor attack detection. The application...
    Get full text
    Get full text
    Thesis
  3. 3
    by Manaa, Mehdi Ebady
    Published 2012
    ... whether they are genuine requests for network services or DoS attacks. Results obtained demonstrate...
    Get full text
    Get full text
    Thesis
  4. 4
    ...Securing the web against frequent cyber attacks is a big concern, attackers usually intend...
    Get full text
    Get full text
    Thesis
  5. 5
    by Nor Izham, Subri
    Published 2017
    ...The Distributed Denial of Services (DDoS) is an imminent attack that can threaten cyber security...
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
    by Khader, Aqeel Sahi
    Published 2010
    ... advances in techniques used for attacks. One of the easiest and most serious of these attacks is the MS...
    Get full text
    Get full text
    Thesis
  7. 7
    by Annane, Boubakeur
    Published 2020
    ... time. The experiments show that the proposed approach achieved lower attacker’s efficiency and coverage...
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
    ... and infrastructure from attacker internet firewall. The experts believe that Access Points (AP'S) present a large...
    Get full text
    Thesis
  9. 9
    by Yasear, Shaymah Akram
    Published 2015
    ... and also resistant against possible attacks. However, the existing ultra-lightweight authentication...
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
    by Mahdi, Reyadh H
    Published 2009
    ... communications channels, and it use to avoid attack that happen on cryptography in general and on stream cipher...
    Get full text
    Get full text
    Thesis
  12. 12
    by Irshad, Hira
    Published 2020
    .... The equity markets in Pakistan respond negatively to attacks on educational institutes and businesses whereas...
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
    by Taqiyah Khadijah, Ghazali
    Published 2023
    ... and privacy. Moreover, this also increases the probability of privacy leakage which lead to attacks...
    Get full text
    Get full text
    Thesis
  14. 14
    by Siswanto, Apri
    Published 2022
    ... assess the systems, fingerprints could be replicated and modified by attackers. Currently, most existing...
    Get full text
    Get full text
    Thesis
  15. 15
    by Ghathwan, Khalil Ibrahim
    Published 2016
    ...Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks...
    Get full text
    Get full text
    Thesis
  16. 16
    by Revathy, Amadera Limgam
    Published 2019
    ... found on Malaysian videos are political attack and racial attack. Other subcategories include name...
    Get full text
    Get full text
    Thesis
  17. 17
    ... attacks. This research investigates the use of a promising technique from machine learning to designing...
    Get full text
    Get full text
    Thesis
  18. 18
    by Eric, Karerangabo
    Published 2009
    ...Today, computer networks attacks have continued to increase in severity and sophistication. Data...
    Get full text
    Get full text
    Thesis
  19. 19
    by Abiodun, Bakare Mustapha
    Published 2011
    ... wireless network from cyber terrorists attacks. The main objective of this research is to deploy...
    Get full text
    Get full text
    Thesis
  20. 20
    by Oyekola, Ayoola Gabriel
    Published 2023
    ... of the candidate's capacity cum propriety and positive reaction to policy implementation and projection. Attack...
    Get full text
    Get full text
    Thesis