Showing 241 - 260 results of 951 for search '"Attacker"', query time: 0.05s Refine Results
  1. 241
    by Al-Zarqawee, Aws Naser
    Published 2018
    ...Distributed denial-of-service (DDoS) attacks are incidents in a cloud computing environment...
    Get full text
    Thesis
  2. 242
    by Emami, Mir Shahriar
    Published 2012
    ... that current digital image watermarking approaches are prone to be impacted by watermarking attacks which...
    Get full text
    Thesis
  3. 243
  4. 244
    by Abdullah, Halimah Tun
    Published 2014
    ...Digital watermarking is used to protect the intellectual property from malicious attack...
    Get full text
    Thesis
  5. 245
    by Yahaya, Zulkifli
    Published 2005
    ... between the two airfoils. The effects of Reynolds numbers, angles of attack, and airfoil profiles...
    Get full text
    Thesis
  6. 246
    by Bahrim, Ahmad A’limmuddin
    Published 2023
    ...A form of security issue called cross-site scripting (XSS) enables attackers to insert malicious...
    Get full text
    Thesis
  7. 247
    by Parveen, Sajida
    Published 2016
    ... threats, one of them is spoofing attacks. A spoofing attack occurs when a person tries to masquerade...
    Get full text
    Thesis
  8. 248
    by Bakhdlaghi, Yousef Abdullah
    Published 2020
    ... the discovery of large-scale and coordinated attacks. Although existing CIDN offers consultation capability...
    Get full text
    Thesis
  9. 249
    by Dak, Ahmad Yusri
    Published 2019
    ... to being vulnerable to jamming attacks. A study found that eighty one percent of attacks occurs...
    Get full text
    Thesis
  10. 250
    by Soleymani, Seyed Ahmad
    Published 2019
    ... patterns of attacks such as simple attack, opinion tampering attack, and cunning attack. In conclusion...
    Get full text
    Thesis
  11. 251
    by Haratian, Mohammad Hossein
    Published 2009
    ... number of efforts have concentrated on handling the vast variety of security attacks. The characteristic...
    Get full text
    Thesis
  12. 252
    ... that can achieve consistent results when employed for the detection of multiple attack types. Hence...
    Get full text
    Thesis
  13. 253
    by Yaribakht, Amir Hesam
    Published 2020
    ... that can be robust against common image processing attacks such as JPEG compression, rotation, sharpening...
    Get full text
    Thesis
  14. 254
  15. 255
    by Pang, Kok An
    Published 2021
    ... against side channel cube attack is also presented in this thesis. For most of the secret keys, by reading...
    Get full text
    Get full text
    Thesis
  16. 256
    Thesis Book
  17. 257
    by Behnia, Armaghan
    Published 2013
    ... period of validity it may compromise through brute force attacks or dictionary attacks. In order to come...
    Get full text
    Thesis
  18. 258
    by Mustafa, Intan Shafinaz
    Published 2006
    ...) open to the potential attacks during transmission. Recipients required a mechanism which can prove...
    Get full text
    Thesis
  19. 259
    by Dhahir, Saif Mahmood
    Published 2017
    ..., dynamic, infrastructure-less and self-organizing, MANETs are vulnerable to several kinds of attacks...
    Get full text
    Thesis
  20. 260
    by Noorlaily Izwana Ibrahim
    Published 2012
    ... to the users. The term “malvertising” comes from the word malware and advertising. It is one type of attack...
    Get full text
    Thesis