Showing 141 - 160 results of 933 for search '"Attacker"', query time: 0.04s Refine Results
  1. 141
    by Sufi, Abdulkadir Abukar
    Published 2014
    ... domain, which the attacker have been successfully access the database file and the data became exposed...
    Get full text
    Thesis
  2. 142
    by Omolara, Abiodun Esther
    Published 2020
    ... scheme to address brute-force attacks specifically in the context of password-based encryption systems...
    Get full text
    Thesis
  3. 143
    by Halizah, Saad
    Published 2013
    ... of Android design also become it flaw because it not only attract Android user but also attacker for Android...
    Get full text
    Get full text
    Thesis
  4. 144
    by Mahfoudh, Asma
    Published 2019
    ... techniques satisfy all obfuscation effectiveness criteria to resist the attack of Reverse Engineering...
    Get full text
    Thesis
  5. 145
    by Sapri, Nurnadia
    Published 2015
    ..., it is unsecure because the attacker can break security parameters to obtain access to the data that currently...
    Get full text
    Thesis
  6. 146
    by Abdurahim, Almabruk Shatewi
    Published 2012
    ... irrespective of ‘Who’ holds the card; like a key to a door. Since an attacker can possess the card, access...
    Get full text
    Thesis
  7. 147
    by Abdul Jalil, Mohd Fairuz
    Published 2008
    ... vulnerabilities that does not require security expertise is desirable. By using SQL injection attacks, an attacker...
    Get full text
    Thesis
  8. 148
    by Ibrahim, Riziana
    Published 2012
    ...The cyber attack is a severe attack that might cause harm especially to the big organization...
    Get full text
    Thesis
  9. 149
    by Alqahtani, Saeed Ibrahim S.
    Published 2009
    .... Attackers can seriously damage the integrity of filesystems. Attack detection is complex and time-consuming...
    Get full text
    Thesis
  10. 150
    by Mansor, Ahmad Abdul Azim
    Published 2007
    ... attacker techniques and how to defend against them. Little specialized knowledge is required to set up...
    Get full text
    Thesis
  11. 151
    by Bismi, Nur Syafiqa
    Published 2020
    ... phones used. One acts as a client and a personal computer act as an attacker. Wireshark and packet...
    Get full text
    Thesis
  12. 152
    .... The adversaries attempt to launch the variety of attacks against a system to capture their needed information...
    Get full text
    Thesis
  13. 153
    by Zabri, Muhammad Tholhah
    Published 2018
    ... being tracked by an attacker from the internet. Then, to block any Domain Name System (DNS) request...
    Get full text
    Thesis
  14. 154
    by Abarghouei, Babak Emami
    Published 2013
    .... An attacker can devour the sensor resources. No central monitoring system, lead to mobile sensor network...
    Get full text
    Thesis
  15. 155
    by Ahmad Zawawi, Md. Nabil
    Published 2006
    ... the threats of an active attack by an active warden in which the robustness of the stegoobject is concerned...
    Get full text
    Thesis
  16. 156
    by Khalaf, Emad T
    Published 2012
    ... as possible with high visible quality in a way that it does not allow any attacker to even detect...
    Get full text
    Thesis
  17. 157
    by Abdul Mubin, Norzul Masri
    Published 2017
    .... Mobile device are the main devices that can be manipulates by the attacker towards their victims...
    Get full text
    Get full text
    Thesis
  18. 158
    by Hirzan, Alauddin Maulana
    Published 2017
    ... to allow transmission. Attacker from IPv6 network can use this tunneling mechanism to send intrusion...
    Get full text
    Get full text
    Thesis
  19. 159
    by Zare Anari, Abbas Mehdizadeh
    Published 2008
    ... to detect or prevent an attacker which tampers against data. In this thesis, focus is given on Mobile IPv6...
    Get full text
    Thesis
  20. 160
    by Mamoudou, Sangare
    Published 2015
    Get full text
    Thesis