Showing 21 - 40 results of 933 for search '"Attacker"', query time: 0.03s Refine Results
  1. 21
    by Inayat, Zakira
    Published 2017
    Get full text
    Thesis Book
  2. 22
  3. 23
  4. 24
  5. 25
    by Zhu, Jianhua
    Published 2000
    Thesis Book
  6. 26
    by Khan, Suleman
    Published 2017
    Get full text
    Thesis Book
  7. 27
  8. 28
    by Lau, Wei Khang
    Published 2016
    ... applied to digital files to withstand against cropping and resizing attack. In this Dual-watennarking...
    Get full text
    Get full text
    Get full text
    Thesis
  9. 29
    by Chai, Jee Sing
    Published 2008
    .... Generally, the schemes in spatial domain are usually less robust to attacks; while the schemes in frequency...
    Get full text
    Thesis
  10. 30
    by Abdollah, Mohd Faizal
    Published 2009
    ... transaction. They have also become the main mean to attack host. The popularity of intrusion tools and script...
    Get full text
    Get full text
    Thesis
  11. 31
  12. 32
    by Azali, Muhamad Rizal
    Published 2005
    ...This project is using a honeypot as a tool to detect internal network attack at Faculty...
    Get full text
    Thesis
  13. 33
    by Roslan, Fairuzan
    Published 2004
    ... of the greatest problems the security community faces is lack of information on the attacker. This is one...
    Get full text
    Thesis
  14. 34
    by Hasan, Dahah Ahmed Haidarah
    Published 2019
    ... threats is phishing attacks launched for the purpose of stealing certain sensitive information of victims...
    Get full text
    Thesis
  15. 35
    by Modirkhazeni, Ali
    Published 2011
    ... of conventional techniques of attack and the attacks that are not desirable because of limited resources is a...
    Get full text
    Thesis
  16. 36
    ... and attacks on the routing protocols in the MANET. One of the critical threats is the wormhole attacks, which...
    Get full text
    Thesis
  17. 37
    by Elejla, Omar E. O.
    Published 2018
    ... in IPv6 native networks. IPv6 is vulnerable to a number of attacks from IPv4, besides new attacks have...
    Get full text
    Thesis
  18. 38
    by Omar, Mohd Nizam
    Published 2011
    ... to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation...
    Get full text
    Thesis
  19. 39
    by Jantan, Mohd. Faidzal
    Published 2010
    .... Far from that, Algebraic Attacks and Fast Algebraic Attack has become popular among cryptographers...
    Get full text
    Thesis
  20. 40
    by Ibrahim, Husam Hamid
    Published 2018
    ... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...
    Get full text
    Get full text
    Get full text
    Thesis