Showing 101 - 120 results of 933 for search '"Attacker"', query time: 0.04s Refine Results
  1. 101
    by Kordi, Elahe Fazeldeh
    Published 2014
    ... MANET vulnerable to security attacks. Ad hoc On-demand Distance Vector routing (AODV) is one of the best...
    Get full text
    Thesis
  2. 102
    by Abdul Razak, Aina Nabila
    Published 2019
    ... to be protected from any attacks. The malware detection process becomes a challenge because the attacker has a new...
    Get full text
    Thesis
  3. 103
    by Ismail, Sushilawati
    Published 2014
    ... in coal ash brick on the density, water absorption and salt attack resistance. Comparison of those...
    Get full text
    Thesis
  4. 104
    by Said, Mohamed Abdisalan
    Published 2015
    ... had shown that the watermark is robust to geometric attacks and removal attacks. DCT and DWT...
    Get full text
    Get full text
    Get full text
    Thesis
  5. 105
    by Ahmed Marwan, Idrees Aleesa
    Published 2021
    ...The news about distributed denial of service (DDoS) attacks is rapidly increased around the world...
    Get full text
    Get full text
    Get full text
    Thesis
  6. 106
    by Enshaei, Mehdi
    Published 2015
    ... to attacks due to the open, cooperative and dynamic nature and needs a new method for secure communication...
    Get full text
    Thesis
  7. 107
    by Che Hasan, Hafizah
    Published 2018
    .... However, NFC is susceptible to some attacks such as data fabrication and eavesdropping. Thus, the mobile...
    Get full text
    Thesis
  8. 108
    by Malekzadeh, Mina
    Published 2011
    .... The main threats against availability of the networks are Denial of Service (DoS) and replay attacks...
    Get full text
    Thesis
  9. 109
  10. 110
    by Mohamad Alias, Mohd Azuan
    Published 2012
    ...Port knocking is technique first introduce in the Black Hat to prevent attackers from discovering...
    Get full text
    Thesis
  11. 111
    ... password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without...
    Get full text
    Thesis
  12. 112
    ... technology is not free from new security concerns. The Distributed Denial of Service (DDoS) attack is one...
    Get full text
    Thesis
  13. 113
    by Dolatabadi, Zahra Sadat Shams
    Published 2013
    ... to propose a method that can offer high resistance against some image distortions in the geometrical attack...
    Get full text
    Thesis
  14. 114
    by Araghi, Tanya Koohpayeh
    Published 2013
    ... important issue for developing mobile ad hoc networks (MANETs). They expose to various kinds of attacks...
    Get full text
    Thesis
  15. 115
    by Ashouruan, Bahram Yaghoubzadeh
    Published 2013
    ..., it is compromised in face to various sorts of attacks. Unfortunately, none of the presented secured routing...
    Get full text
    Thesis
  16. 116
    by Mohd Foozy, Cik Feresa
    Published 2017
    ... the framework for a single attack detection for Spam has been studied. Phishing has never been studied. Existing...
    Get full text
    Get full text
    Thesis
  17. 117
    by C. Arjuman, Navaneethan
    Published 2021
    ... flaw within RD protocol has led to Fake RA attacks. Studies shows that the standard RD protocol...
    Get full text
    Thesis
  18. 118
    by Ibrahim Al-Ani, Ahmed Khallel
    Published 2020
    ... aims to prevent a DoS attack during the DAD process by designing a rule-based mechanism. The proposed...
    Get full text
    Thesis
  19. 119
  20. 120
    by Ahmed Khalaf, Bashar
    Published 2019
    ...) attack. The advent of technological era has also brought along the threat of DDoS attacks for a variety...
    Get full text
    Get full text
    Get full text
    Thesis