Showing 221 - 240 results of 933 for search '"Attacker"', query time: 0.05s Refine Results
  1. 221
    by Juliza, Mohamad Arif
    Published 2022
    .... The openness of the Android mobile devices is extremely vulnerable to malware attacks. Even though various...
    Get full text
    Thesis
  2. 222
    by Baharudin, Muhammad Saufi
    Published 2009
    .... By using massive attack of zombie, the attackers launch a distribution denial of services (ddos) against...
    Get full text
    Thesis
  3. 223
    by Gaithuru, Juliet Nyokabi
    Published 2013
    ... ways of attacking the algorithms used for encryption. This process of continued improvement...
    Get full text
    Thesis
  4. 224
    by Kalybayev, Almukhammed
    Published 2013
    ... years, potentially leading to a loss of cash. The methods which are utilized by attackers to collect...
    Get full text
    Thesis
  5. 225
    by Mokaramian, Shahram
    Published 2013
    ...2R classes, which include malicious attacks. Therefore, it requires a resampling technique...
    Get full text
    Thesis
  6. 226
    by Kamarudin, Nazhatul Hafizah
    Published 2018
    ... threatened by security attacks. It is noted that the use of username and password as an authentication scheme...
    Get full text
    Thesis
  7. 227
    by Yaakub, Mohd Fauzi
    Published 2019
    ...The issue of high angle of attacks at the retreating blade receives attention from countless...
    Get full text
    Get full text
    Get full text
    Thesis
  8. 228
  9. 229
    by Omotunde, Habeeb Oladapo
    Published 2018
    ...As SQL injection attack (SQLIA) continues to threaten web applications despite several techniques...
    Get full text
    Get full text
    Get full text
    Thesis
  10. 230
    by Eid, Almazrooie Mishal
    Published 2018
    ...Asymmetric and symmetric cryptography are believed to be secure against any attack using classical...
    Get full text
    Thesis
  11. 231
    by Hina, Aliyu Danladi
    Published 2019
    ... against fast correlation attack, one of the major attacks known to weaken nonlinear combiner...
    Get full text
    Thesis
  12. 232
    by Buja, Alya Geogiana
    Published 2018
    ... of block ciphers against side-channel cube attack and differential fault analysis.Thirdly,all proposed...
    Get full text
    Get full text
    Thesis
  13. 233
    by Juremi, Julia
    Published 2018
    ... cryptographic attacks. Somehow, the substitution box (s-box) in the AES block cipher is fixed or static for all...
    Get full text
    Thesis
  14. 234
    by Teh, Jia Yew
    Published 2017
    ... to malicious, undesirable effects such as buffer overflows, privilege escalation (spawning an attackers’ shell...
    Get full text
    Thesis
  15. 235
    by Ali, Mohammed Hasan
    Published 2019
    ... of false positive alerts, low detection rates of rare but dangerous attacks, and the need for a constant...
    Get full text
    Thesis
  16. 236
    by Al-Zarqawee, Aws Naser
    Published 2018
    ...Distributed denial-of-service (DDoS) attacks are incidents in a cloud computing environment...
    Get full text
    Thesis
  17. 237
    by Emami, Mir Shahriar
    Published 2012
    ... that current digital image watermarking approaches are prone to be impacted by watermarking attacks which...
    Get full text
    Thesis
  18. 238
  19. 239
    by Abdullah, Halimah Tun
    Published 2014
    ...Digital watermarking is used to protect the intellectual property from malicious attack...
    Get full text
    Thesis
  20. 240
    by Yahaya, Zulkifli
    Published 2005
    ... between the two airfoils. The effects of Reynolds numbers, angles of attack, and airfoil profiles...
    Get full text
    Thesis