Showing 61 - 80 results of 933 for search '"Attacker"', query time: 0.04s Refine Results
  1. 61
    by Hosseini, Seyed Mostafa Mir
    Published 2013
    ... is going to explore integrity attacks in RFID systems. Even though the previous related works have...
    Get full text
    Thesis
  2. 62
    by Kashefi, Iman
    Published 2013
    ... for attackers. Among the leaders in the world of smartphones, Android is a novel platform with rapidly growing...
    Get full text
    Thesis
  3. 63
  4. 64
    by Islam, Amanul
    Published 2017
    Thesis Book
  5. 65
    by Ghaben, Ayman Ibrahim Ali
    Published 2023
    ...This thesis proposes an approach to detect HTTP flooding DDoS attacks on web servers. The proposed...
    Get full text
    Thesis
  6. 66
    by Rastegari, Samaneh
    Published 2009
    .... In order to prevent this system from different types of attacks, we need to prepare a classification...
    Get full text
    Thesis
  7. 67
    by Mohd Ariffin, Noor Afiza
    Published 2017
    ... data against all types of attacks. Furthermore, most current research only focuses on improving...
    Get full text
    Thesis
  8. 68
    by Harun, Zati Bayani
    Published 2019
    ... (DDoS) attack which is jamming attack. Almost 81% of jamming attacks are initiated at the MAC layer due...
    Get full text
    Thesis
  9. 69
  10. 70
  11. 71
  12. 72
    ...The goal of the thesis is to propose an approach that can detect flash crowd attacks that target...
    Get full text
    Thesis
  13. 73
    by Suardi, Khairmen
    Published 2005
    ... what causes the hydrogen attack and dealuminification. Control microstructure and phases through heat...
    Get full text
    Thesis
  14. 74
    by Rajabi, Muhammad Javad
    Published 2018
    ... be invisible and robust to common processing and attack. So far, current research has succeeded in maintaining...
    Get full text
    Thesis
  15. 75
    by Bojnord, Hoda Soltanian
    Published 2013
    .... VANET security is essential because a badly designed VANET is vulnerable to network attacks...
    Get full text
    Thesis
  16. 76
    by Mosa, Mohammad Rasmi Hassun
    Published 2013
    ... to reconstruct attack intentions and estimate similar attack strategies. The intentions are identified through a...
    Get full text
    Thesis
  17. 77
    by Cheraghi, Seyed Mohammad
    Published 2013
    ... malicious user may deliberately mislead other vehicles and vehicular agencies. Sybil attacks have been...
    Get full text
    Thesis
  18. 78
    by Ali, Mohammed Qasim
    Published 2019
    ... to transmit information using IPv6 stack. Sensors perform critical tasks and become targets of attacks...
    Get full text
    Get full text
    Get full text
    Thesis
  19. 79
    by Hassan, Abdullahi Mohamud
    Published 2015
    .... Currently the capability of repetition codes on various attacks in not sufficiently studied...
    Get full text
    Get full text
    Get full text
    Thesis
  20. 80