Showing 181 - 200 results of 933 for search '"Attacker"', query time: 0.05s Refine Results
  1. 181
    by Elrowayati, Ali Abdulhafid
    Published 2020
    ... and/or unintentional attacks, such as recompression attack, lossy channel attacks, signal processing attacks, frame...
    Get full text
    Get full text
    Get full text
    Thesis
  2. 182
    by Mandala, Satria
    Published 2012
    ...Mobile Adhoc Network (MANET) is vulnerable to network attacks due toits open communication medium...
    Get full text
    Thesis
  3. 183
    by Mat Nor, Fazli
    Published 2016
    ... client-side application vulnerabilities as well as privacy threats. Attackers could exploit...
    Get full text
    Thesis
  4. 184
    by Abdulkader, Zaid A.
    Published 2018
    ... if it undergoes attack. To do this, it must use alternative mechanisms while making sure that it does not affect...
    Get full text
    Thesis
  5. 185
    by Rezaeipour, Davood
    Published 2011
    ... ciphers. It cannot be analyzed by known cryptanalytic attacks. We study AES specifications and also...
    Get full text
    Thesis
  6. 186
    by Chizoba, Okwara Jerry
    Published 2019
    ... of the malicious attacks given serious attention as they have shown some level of complexities thereby causing...
    Get full text
    Thesis
  7. 187
    by Qasem, Murad Abdo Rassam
    Published 2010
    ..., generally can not detect novel attacks. A method that offers a promise to solve this problem is the anomaly...
    Get full text
    Thesis
  8. 188
    by Abu Bakar, Nurul Badriah
    Published 2013
    ... and unintentional attacks but the various available techniques for watermarking have yet to attain the best defence...
    Get full text
    Thesis
  9. 189
    by Mubarak, Mohd Faizal
    Published 2015
    ... of RFID system with other devices introduce security vulnerabilities which could be exploited by attackers...
    Get full text
    Thesis
  10. 190
    by Mohamed Yassin, Warusia
    Published 2015
    ... researchers, the low attack detection rates (also known as the detection of true positive) that reflect...
    Get full text
    Thesis
  11. 191
    by Malekzadeh, Mina
    Published 2007
    .... The lack of protection on management frames causes an intruder to launch different types of attack...
    Get full text
    Thesis
  12. 192
    by Sharabyan, Mohammad Tahghighi
    Published 2015
    ... domain. The GC, like other matrix cryptosystems, cannot resist against chosen-plaintext attack...
    Get full text
    Thesis
  13. 193
    by Wan Mohd Ruzai, Wan Nur Aqlili
    Published 2021
    ... cryptanalysis (or often called ‘attack’) against RSA and its variants are not based on this integer...
    Get full text
    Thesis
  14. 194
    by Ahmad Khalid, Shamsul Kamal
    Published 2018
    ...In today’s world, designer of a watermarking system had to constantly faced with determined attacks...
    Get full text
    Get full text
    Get full text
    Thesis
  15. 195
    ... the attacks. Physical security is the most important because it is the first layer in security. In Yemen...
    Get full text
    Thesis
  16. 196
  17. 197
    by Adenan, Nurul Nur Hanisah
    Published 2021
    ... to enhance its security. In this thesis, we present three analytical attacks on the modulus N = p 2q...
    Get full text
    Thesis
  18. 198
    ...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...
    Get full text
    Thesis
  19. 199
    by Yasir, Javed
    Published 2020
    ...). Formal and computational analysis of TLwS shows that it can mitigate replay attack, Man-in-the-Middle...
    Get full text
    Thesis
  20. 200
    by Al Noman Ranak, Md Sayfullah
    Published 2018
    ... considerable number of attacks have been noted in the recent past. To resist these attacks, many passwords...
    Get full text
    Thesis