Showing 281 - 300 results of 951 for search '"Attacker"', query time: 0.04s Refine Results
  1. 281
    by Mnati, Mustafa Nasser
    Published 2010
    ..., but the problem of robustness and transparency from any attack is still becomes the main research issue...
    Get full text
    Thesis
  2. 282
    by Daud, Muhamad Azlan
    Published 2014
    ... input. Alvarez through his one-time pad attack successfully attacked the Baptista cyptosystem. Ariffin...
    Get full text
    Thesis
  3. 283
    by Altaf, Afaq
    Published 2011
    Get full text
    Thesis
  4. 284
  5. 285
  6. 286
    by Shojanazeri, Hamid
    Published 2013
    ... as watermarks to provide malicious attack classification and locating tampered area. The Zernike moments...
    Get full text
    Thesis
  7. 287
    ...Phishing attack detection is a significant research area for network security applications...
    Get full text
    Get full text
    Get full text
    Thesis
  8. 288
    by Anwar, Shahid
    Published 2019
    ... coordinated attacks including spam emails, click frauds, bitcoins mining, distributed denial of service...
    Get full text
    Thesis
  9. 289
    ...-based methods, while in automated methods the robustness against intentional or unintentional attacks...
    Get full text
    Thesis
  10. 290
    by Ordi, Ali
    Published 2016
    ... in preventing Denial of Service (DoS) attacks. A ‘Connection Request Flooding’ DoS (CRF-DoS) attack is launched...
    Get full text
    Thesis
  11. 291
    by Mohamad Fadli, Zolkipli
    Published 2012
    ...-day attacks, malware avoidance techniques and hybrid malware are highlighted. Furthermore, a common...
    Get full text
    Thesis
  12. 292
    by Rosli, Athirah
    Published 2017
    .... The developed equation was validated via experimentation that involved testing the UDP flooding attack, TCP...
    Get full text
    Thesis
  13. 293
    by Mohamad Dahalan, Ardi Dasyni
    Published 2013
    ...’ pictures symbolising the letter ‘S’ for singular verbs in ‘Snake Attack’ activity. For the purpose...
    Get full text
    Thesis
  14. 294
    by Alamjuri, Roziela Hanim
    Published 2008
    ... is non-durable. It is susceptible to fungal and termite attacks. Hence, there is a need to treat bamboo...
    Get full text
    Thesis
  15. 295
    by Alezabi, Kamal Ali Ahmed
    Published 2017
    ... of the existing authentication schemes are complex and vulnerable to network attacks such as User Identity...
    Get full text
    Thesis
  16. 296
    by Chong , Chuong Leong
    Published 2011
    ... power at a rotational speed of 300rpm. Wind turbine is investigated as a function of angle of attack...
    Get full text
    Thesis
  17. 297
    by Siddiqui, Zeeshan
    Published 2015
    ... for TMIS systems while addressing a number of authentication attacks along with performance issues. However...
    Get full text
    Thesis
  18. 298
    ... images requires the generation of intricate secret keys that protect the images from diverse attacks...
    Get full text
    Thesis
  19. 299
    by Ibrahim, Ayman Khallel
    Published 2020
    ... making it vulnerable to various threats, such as rogue DHCPv6 server attack and passive attack. Two well...
    Get full text
    Thesis
  20. 300
    by Adeeb, Jnaidi Saed Maher
    Published 2019
    ...Since the period followed the September 11 in 2001 attack, and the second Palestinian uprising...
    Get full text
    Thesis