Showing 1 - 20 results of 933 for search '"Attacker"', query time: 0.04s Refine Results
  1. 1
    by Zhang, Yongjun
    Published 2001
    Thesis Book
  2. 2
  3. 3
    by Chan, Kah Wai
    Published 2021
    ...The concrete structures subject to aggressive environment under sulphate attack is of key...
    Get full text
    Thesis
  4. 4
    by Mohd. Ghazzali, Amalina
    Published 2008
    ...This study of web worms attack on web application can be implemented to enhance the security...
    Get full text
    Thesis
  5. 5
  6. 6
    by Li, Ying
    Published 2002
    Thesis Book
  7. 7
    by Raenu Kolandaisamy
    Published 2020
    Get full text
    Thesis Book
  8. 8
    by Haron, Haliza
    Published 2015
    ... to the attackers. This study will focus on jamming attack and the case study has been done at Kolej Komuniti Masjid...
    Get full text
    Get full text
    Thesis
  9. 9
    ...Plaintext Recovery Attack is a new attack in security system world. It was discovered lately...
    Get full text
    Thesis
  10. 10
    by Sanaei, Mojtaba Ghanaatpisheh
    Published 2013
    ..., selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One...
    Get full text
    Thesis
  11. 11
    by Khan, Muhammad Murad
    Published 2013
    ... In The Middle can observe key exchange messages and can setup MITM attack between communication. Security...
    Get full text
    Thesis
  12. 12
    by Askarin, Mohammad Mogharen
    Published 2018
    Thesis Book
  13. 13
    by Alahmadi, Ahmed Mohammed A.
    Published 2018
    ... to achieve these vital features the Bitcoin system should be provably secure against the attacks. Many...
    Get full text
    Thesis
  14. 14
    by Mohd Jaafar, Fatin Haziqah
    Published 2013
    ...This study is about termite attack at historical building, where it is involves a conservation work...
    Get full text
    Thesis
  15. 15
    ...Static cyphers use static transformations for encryption and decryption. Therefore, the attacker...
    Get full text
    Thesis
  16. 16
    by Apandi, Mohamad Aiman Hanif
    Published 2019
    ...In the wireless network, there is an attack called Wormhole attack that capable in confusing...
    Get full text
    Thesis
  17. 17
    by Mohamad, Nurul Zawiyah
    Published 2008
    ... to keep sensitive and confidential information. Since SQL injection attacks occurred as a new way...
    Get full text
    Thesis
  18. 18
    ... of more users. Thus, it is vulnerable to a variety of attacks, including denial of service (DoS) which...
    Get full text
    Thesis
  19. 19
    ... building. Amongst the common conservation problems of heritage buildings, salt attack and rising damp...
    Get full text
    Thesis
  20. 20