Showing 41 - 60 results of 933 for search '"Attacker"', query time: 0.04s Refine Results
  1. 41
    by Ridha, Hussein Ali
    Published 2020
    ... communication from malicious attacks. The data is enabled to be received by the recipients. The data is delayed...
    Get full text
    Get full text
    Get full text
    Thesis
  2. 42
    by Ibrahim, Husam Hamid
    Published 2018
    ... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...
    Get full text
    Get full text
    Get full text
    Thesis
  3. 43
    by Lau, Wei Khang
    Published 2016
    ... applied to digital files to withstand against cropping and resizing attack. In this Dual-watermarking...
    Get full text
    Get full text
    Get full text
    Thesis
  4. 44
    by Mohd Salleh, Nurhashikin
    Published 2018
    ... uses the Internet as their platform to form online communities and launch their attack...
    Get full text
    Get full text
    Thesis
  5. 45
    by Ho, Peng Foong
    Published 2014
    Thesis Book
  6. 46
    by Qadijah Adzmir
    Published 2019
    Thesis Book
  7. 47
  8. 48
    by Zhang, Zijun
    Published 1998
    Thesis Book
  9. 49
    by Chee, Kok Onn
    Published 2013
    Thesis Book
  10. 50
    by Izaddoost, Alireza
    Published 2008
    ... to its intended users. The Denial of Service (DoS) attacks are becoming more serious in security...
    Get full text
    Thesis
  11. 51
    by Ghobadifar, Faranak
    Published 2015
    ... in the fields. The main purpose of this research was to determinate pest attack in paddy field using remote...
    Get full text
    Thesis
  12. 52
    by Ahmed, Dana Hasan
    Published 2017
    ... Reflection Denial of Service (DRDoS) attacks which are called Reflection/Amplification and hassles...
    Get full text
    Thesis
  13. 53
    by Javan, Ali
    Published 2011
    ... threats including coordinated distributed attacks have flourished against the vital services and priceless...
    Get full text
    Thesis
  14. 54
    by Hussein, Noor Sabeeh
    Published 2016
    ... kinds of attacks like denial of service attacks, sybil attacks, jamming attacks, black/sink hole attacks...
    Get full text
    Thesis
  15. 55
    Book
  16. 56
    by Kuhanraj, Balan
    Published 2020
    ... serious network threats such as denial of service attack, data modification attack, impersonation attack...
    Get full text
    Thesis
  17. 57
  18. 58
    by Muamer N., Mohammed
    Published 2011
    ... for researches and this connection is prone to vulnerability caused by the attackers in steeling information from...
    Get full text
    Thesis
  19. 59
    by Abadi, Ahad Akbar
    Published 2013
    ... issues still the considerable difficulties for customers. This means the attacks which can threat...
    Get full text
    Thesis
  20. 60
    by Boroujerdizadeh, Ali
    Published 2013
    .... We narrow down the project to a specific attack. Collusion attack is the main problem for video...
    Get full text
    Thesis