Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
141by Sufi, Abdulkadir Abukar“... domain, which the attacker have been successfully access the database file and the data became exposed...”
Published 2014
Get full text
Thesis -
142by Omolara, Abiodun Esther“... scheme to address brute-force attacks specifically in the context of password-based encryption systems...”
Published 2020
Get full text
Thesis -
143by Halizah, Saad“... of Android design also become it flaw because it not only attract Android user but also attacker for Android...”
Published 2013
Get full text
Get full text
Thesis -
144by Mahfoudh, Asma“... techniques satisfy all obfuscation effectiveness criteria to resist the attack of Reverse Engineering...”
Published 2019
Get full text
Thesis -
145by Sapri, Nurnadia“..., it is unsecure because the attacker can break security parameters to obtain access to the data that currently...”
Published 2015
Get full text
Thesis -
146by Abdurahim, Almabruk Shatewi“... irrespective of ‘Who’ holds the card; like a key to a door. Since an attacker can possess the card, access...”
Published 2012
Get full text
Thesis -
147by Abdul Jalil, Mohd Fairuz“... vulnerabilities that does not require security expertise is desirable. By using SQL injection attacks, an attacker...”
Published 2008
Get full text
Thesis -
148by Ibrahim, Riziana“...The cyber attack is a severe attack that might cause harm especially to the big organization...”
Published 2012
Get full text
Thesis -
149by Alqahtani, Saeed Ibrahim S.“.... Attackers can seriously damage the integrity of filesystems. Attack detection is complex and time-consuming...”
Published 2009
Get full text
Thesis -
150by Mansor, Ahmad Abdul Azim“... attacker techniques and how to defend against them. Little specialized knowledge is required to set up...”
Published 2007
Get full text
Thesis -
151by Bismi, Nur Syafiqa“... phones used. One acts as a client and a personal computer act as an attacker. Wireshark and packet...”
Published 2020
Get full text
Thesis -
152by Abrishamchi, Mohammad Ali Nassiri“.... The adversaries attempt to launch the variety of attacks against a system to capture their needed information...”
Published 2014
Get full text
Thesis -
153by Zabri, Muhammad Tholhah“... being tracked by an attacker from the internet. Then, to block any Domain Name System (DNS) request...”
Published 2018
Get full text
Thesis -
154by Abarghouei, Babak Emami“.... An attacker can devour the sensor resources. No central monitoring system, lead to mobile sensor network...”
Published 2013
Get full text
Thesis -
155by Ahmad Zawawi, Md. Nabil“... the threats of an active attack by an active warden in which the robustness of the stegoobject is concerned...”
Published 2006
Get full text
Thesis -
156by Khalaf, Emad T“... as possible with high visible quality in a way that it does not allow any attacker to even detect...”
Published 2012
Get full text
Thesis -
157by Abdul Mubin, Norzul Masri“.... Mobile device are the main devices that can be manipulates by the attacker towards their victims...”
Published 2017
Get full text
Get full text
Thesis -
158by Hirzan, Alauddin Maulana“... to allow transmission. Attacker from IPv6 network can use this tunneling mechanism to send intrusion...”
Published 2017
Get full text
Get full text
Thesis -
159by Zare Anari, Abbas Mehdizadeh“... to detect or prevent an attacker which tampers against data. In this thesis, focus is given on Mobile IPv6...”
Published 2008
Get full text
Thesis -
160