Showing 161 - 180 results of 933 for search '"Attacker"', query time: 0.05s Refine Results
  1. 161
    by Mustafa, Ahmed Sudad
    Published 2017
    ... when a route is requested. However, AODV suffers severely from the black hole attacks where...
    Get full text
    Thesis
  2. 162
    ... of data or files, the third party which called the attackers try to get an illegal access the data without...
    Get full text
    Get full text
    Get full text
    Thesis
  3. 163
    by Memari, Nogol
    Published 2014
    .../identified/reported vulnerabilities. In case of zero day attacks, things may go unidentified for quite a long...
    Get full text
    Thesis
  4. 164
    by Uwadiegwu, Inyama Victor
    Published 2019
    ... there is inadequate security mechanism which an intruder or a man in the middle (MITM) attack can capture...
    Get full text
    Thesis
  5. 165
    by Housain, Anas S.
    Published 2010
    Get full text
    Thesis
  6. 166
    by Mohammed Ismael, Saba
    Published 2018
    .... There is no possibility of an attacker breaking the cipher, as the scheme showed perfect confusion and diffusion...
    Get full text
    Thesis
  7. 167
    by Munther, Munther Numan
    Published 2018
    ... and attackers can easily exploit the inherent security limitation of ARP working principle to penetrate...
    Get full text
    Thesis
  8. 168
    by Mohamed, Kamsiah
    Published 2022
    ... cipher relies on substitution and permutation function to protect the cipher against any attacks...
    Get full text
    Thesis
  9. 169
    by Hasheminejad, Hamidreza
    Published 2015
    ..., computer worms and viruses in the cyberworld. In order to prevent these attacks, technologies...
    Get full text
    Thesis
  10. 170
    by Saleh, Mohammed Abbas Alameen
    Published 2009
    ... is considered not reliable anymore because of its data that can be tampered with by an attacker after conducting...
    Get full text
    Thesis
  11. 171
    by Ali, Siti Hajar Aminah
    Published 2015
    ...) attack. Let say, Company X is selling flowers via online in which the market is from the local...
    Get full text
    Thesis
  12. 172
    by Abdullah, Raihana Syahirah
    Published 2016
    ...Botnets is a tool for high-profile cyber-attack. It is a collection of compromised computer...
    Get full text
    Get full text
    Thesis
  13. 173
    by Wong, Tze Jin
    Published 2011
    .... In this research, numerous mathematical attacks will be analyzed with the cryptosystem and compared with RSA. LUC...
    Get full text
    Thesis
  14. 174
    by Safiee, Mohd. Fauzan
    Published 2007
    ...An Intrusion Detection System (IDS) is detects and blocks unwanted attacks to the civilian...
    Get full text
    Thesis
  15. 175
    ... that cloud computing has. Nevertheless, many researchers have suggested methods to mitigate those attacks...
    Get full text
    Thesis
  16. 176
    by Abd Ghafar, Amir Hamzah
    Published 2020
    ... of the cryptosystem. Most cryptanalysis or commonly called ‘attacks’ upon RSA focuses on solving the IFP in feasible...
    Get full text
    Thesis
  17. 177
    by Abd Ghafar, Amir Hamzah
    Published 2015
    ...This study has two main parts. The first part discusses side-channel attack on the AAb cryptosystem...
    Get full text
    Thesis
  18. 178
    by Mandangan, Arif
    Published 2011
    ... cryptosystem was successfully attacked by the passive adversary attack. This attack is manipulating...
    Get full text
    Thesis
  19. 179
    ... forms of attacks especially in relatedkey model attacks. These days, the most common block cipher...
    Get full text
    Thesis
  20. 180