Showing 301 - 320 results of 933 for search '"Attacker"', query time: 0.04s Refine Results
  1. 301
    by Ong, Elaine Ei Ling
    Published 2021
    ... and SHA1 family algorithm can be break by the generic attacks such as Brute Force attack, domain extender...
    Get full text
    Thesis
  2. 302
    by Wan Ali, Wan Nor Ashiqin
    Published 2015
    ... several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6...
    Get full text
    Thesis
  3. 303
    by Choong, Kai Bin
    Published 2018
    ...”. Text-based CAPTCHA is the most common technique used across the internet to detect bot from attacking...
    Get full text
    Thesis
  4. 304
    by Ahmad Zahari, Nurul Huda
    Published 2011
    ... based on times and attacks. If there is no attack or intrusion detected, MPM will wait...
    Get full text
    Get full text
    Get full text
    Thesis
  5. 305
    by Noor Zuraidin, Mohd Safar
    Published 2011
    ... anomalies are identified, abnormal DNS packet request, the NetBIOS attack, abnormal DNS MX query, DNS...
    Get full text
    Get full text
    Thesis
  6. 306
    by Mokhtar, Ridwan
    Published 2006
    ... model and the three-dimensional results. The effects of angles of attack and aerofoil profiles were...
    Get full text
    Thesis
  7. 307
    ... of protocol. The formal analysis of LEMAP proves that it can mitigate replay attack, Man-in-the-Middle (MITM...
    Get full text
    Thesis
  8. 308
    by Mahmoud Al-Emari, Salam Radi
    Published 2022
    ... to light due to the existing attacks that targeted Ethereum, for instance, the Ethereum DAO attack...
    Get full text
    Thesis
  9. 309
  10. 310
    ... and the basic concept of how PGP works and its key components. We also will look into the possible attack...
    Get full text
    Thesis
  11. 311
    by Mohamed Ahmed, Osman
    Published 1997
    ..., when the airplane flies at low speeds and small angles of attacks, the lift provided by single...
    Get full text
    Thesis
  12. 312
    by Salleh, Muhammad Taufiq
    Published 2016
    ... against the radical attack during direct methanol fuel cell (DMFC) operation was elucidated by the Fenton...
    Get full text
    Thesis
  13. 313
    by Mushtaq, Muhammad Faheem
    Published 2019
    ... cubes are not sufficient to resist attacks and could easily be exploited. Therefore, the large key space...
    Get full text
    Get full text
    Get full text
    Thesis
  14. 314
    by Hassan Disina, Abdulkadir
    Published 2018
    ... attack. Similarly, the key space should be disproportionately large to resist any attack on the secret...
    Get full text
    Get full text
    Get full text
    Thesis
  15. 315
  16. 316
    by Jamil, Norziana
    Published 2013
    ... weight as compared to the existing formula of message expansion. This leads the effort of attackers...
    Get full text
    Thesis
  17. 317
  18. 318
  19. 319
    by Mohd Tamil, Emran
    Published 2004
    ... of 19120 attack alert generated by snort. One of the honeypot deployed has been abused as an IRC bot server...
    Get full text
    Thesis
  20. 320
    by Kasno,
    Published 1982
    ...) ,merupakan serangga yang terpilih untuk dikaji lebih lanjut. A search for arthropods attacking water...
    Get full text
    Thesis