Showing 81 - 100 results of 933 for search '"Attacker"', query time: 0.04s Refine Results
  1. 81
    by Lua, Kim Boon
    Published 2000
    Thesis Book
  2. 82
    by Heliza Juffri
    Published 2005
    Thesis Book
  3. 83
  4. 84
  5. 85
    by Mustafa, Mohd Nawawi
    Published 2015
    ... security incidents is failure to determine the root cause of an incident, thus allowing the attacker...
    Get full text
    Thesis
  6. 86
    by Nordin, Norfarina
    Published 2020
    ...The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has...
    Get full text
    Thesis
  7. 87
    ... medium, WLANs are vulnerable to a myriad of attacks. Although there have been concerted efforts...
    Get full text
    Thesis
  8. 88
    by Mohd Fauzi, Shukor Sanim
    Published 2003
    ... of computer viruses, Trojan horses, worms, and other malicious codes. Computer viruses attacks are problems...
    Get full text
    Thesis
  9. 89
    by Farahmandian, Sara
    Published 2013
    ... the availability of cloud resources comes from Distributed Denial-of Service (DDoS) attack. This kind of attack...
    Get full text
    Thesis
  10. 90
    by Mohammed Ahmed Saad, Redhwan
    Published 2016
    ..., in which ICMP can be blocked or dropped. ICMPv6 opens the door for attackers to attack IPv6 networks...
    Get full text
    Thesis
  11. 91
    by Salih Ali, Nabeel
    Published 2015
    ... applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique...
    Get full text
    Get full text
    Thesis
  12. 92
  13. 93
  14. 94
    by Rohana Abu Kassim
    Published 1998
    Thesis Book
  15. 95
    by Shaukat, Haafizah Rameeza
    Published 2014
    ... them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks...
    Get full text
    Thesis
  16. 96
    by Md Ilyas, Siti Sarah
    Published 2017
    ...The number of phishing attacks involving online banking has records an increase percentage over...
    Get full text
    Thesis
  17. 97
    ... of attackers which publicly embarrasses the victim by sharing some personal information of the victim...
    Get full text
    Thesis
  18. 98
    by Mohammed Alhaj, Tagwa Ahmed
    Published 2018
    ...Attack Scenario Construction (ASC) via Alert Correlation (AC) is important to reveal the strategy...
    Get full text
    Thesis
  19. 99
    by Hussein, Safwan Mawlood
    Published 2012
    ...The vast amount of attacks over the Internet makes the computer users and many organizations under...
    Get full text
    Thesis
  20. 100