Showing 201 - 220 results of 933 for search '"Attacker"', query time: 0.04s Refine Results
  1. 201
    ..., Port Scan Attack and Smurf Attack Detection. The approach is to develop software which performs port...
    Get full text
    Get full text
    Thesis
  2. 202
    ...The growth of the Internet and networking has made securing networks against attacks a very...
    Get full text
    Thesis
  3. 203
    by Khalid Hassan, Mohamed Edris
    Published 2016
    ...This thesis addresses the issue of image watermarking robustness against attacks and especially...
    Get full text
    Thesis
  4. 204
  5. 205
  6. 206
    ...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...
    Get full text
    Thesis
  7. 207
    by Ibrahim, Mohammed
    Published 2021
    ... of people’s lives. However, most IoT devices are vulnerable to botnet attacks. To defend these devices...
    Get full text
    Thesis
  8. 208
    by Mohamed, Ashara Banu
    Published 2015
    ..., one of the main issues that still remains since its beginning is the huge amount of attack alerts...
    Get full text
    Thesis
  9. 209
    by Ali Mohamed, Nachaat Abdelatif
    Published 2022
    ... organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent...
    Get full text
    Thesis
  10. 210
    by Yunanto, Sri
    Published 2013
    ...This thesis attempts to analyze the involvement of militant Islamist groups in terror attacks...
    Get full text
    Thesis
  11. 211
    by Farrokhtala, Ali
    Published 2013
    ... principles but still there is not any approved standard in this field. Black hole attack as one of the most...
    Get full text
    Thesis
  12. 212
    by Omar @ Othman, Wan Zariman
    Published 2019
    ...Algebraic attacks on stream cipher are important in cryptanalysis to both design- ers...
    Get full text
    Thesis
  13. 213
    by Daud, Ali Yusny
    Published 2002
    ...) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form...
    Get full text
    Thesis
  14. 214
    by Hydara, Isatou
    Published 2015
    ... of an application. The presence of XSS vulnerabilities in applications source codes enables XSS attacks to take...
    Get full text
    Thesis
  15. 215
    by Asmawi, Aziah
    Published 2016
    ... become increasingly vulnerable to malicious attacks that could affect essential properties...
    Get full text
    Thesis
  16. 216
  17. 217
    by Abdulbari Ali, Sherif
    Published 2005
    .... Attacks against simplified variants of the AES algorithm have been reported for 128-bit keys, 7 rounds...
    Get full text
    Thesis
  18. 218
    by Mat Isa, Mohd Anuar
    Published 2018
    ... the security of embedded systems in recent years due to the emergence of IoT, and the proliferation of attacks...
    Get full text
    Thesis
  19. 219
    by Hamdi, Ayman Majid
    Published 2019
    ... important. Currently, static substitution boxes (S-Boxes) are vulnerable to data and subkey attacks...
    Get full text
    Thesis
  20. 220
    by Al-Rimy, Bander Ali Saleh
    Published 2019
    .... Even after neutralizing such attacks, the targeted files remain encrypted. This irreversible effect...
    Get full text
    Thesis