Showing 181 - 200 results of 1,198 for search '"Attacker"', query time: 0.05s Refine Results
  1. 181
    by Abarghouei, Babak Emami
    Published 2013
    .... An attacker can devour the sensor resources. No central monitoring system, lead to mobile sensor network...
    Get full text
    Thesis
  2. 182
    by Ahmad Zawawi, Md. Nabil
    Published 2006
    ... the threats of an active attack by an active warden in which the robustness of the stegoobject is concerned...
    Get full text
    Thesis
  3. 183
    by Khalaf, Emad T
    Published 2012
    ... as possible with high visible quality in a way that it does not allow any attacker to even detect...
    Get full text
    Thesis
  4. 184
    by Abdul Mubin, Norzul Masri
    Published 2017
    .... Mobile device are the main devices that can be manipulates by the attacker towards their victims...
    Get full text
    Get full text
    Thesis
  5. 185
    by Hirzan, Alauddin Maulana
    Published 2017
    ... to allow transmission. Attacker from IPv6 network can use this tunneling mechanism to send intrusion...
    Get full text
    Get full text
    Thesis
  6. 186
    by Annane, Boubakeur
    Published 2020
    ... time. The experiments show that the proposed approach achieved lower attacker’s efficiency and coverage...
    Get full text
    Get full text
    Get full text
    Thesis
  7. 187
    by Zare Anari, Abbas Mehdizadeh
    Published 2008
    ... to detect or prevent an attacker which tampers against data. In this thesis, focus is given on Mobile IPv6...
    Get full text
    Thesis
  8. 188
    by Mamoudou, Sangare
    Published 2015
    Get full text
    Thesis
  9. 189
    by Mustafa, Ahmed Sudad
    Published 2017
    ... when a route is requested. However, AODV suffers severely from the black hole attacks where...
    Get full text
    Thesis
  10. 190
    ... of data or files, the third party which called the attackers try to get an illegal access the data without...
    Get full text
    Get full text
    Get full text
    Thesis
  11. 191
    by Memari, Nogol
    Published 2014
    .../identified/reported vulnerabilities. In case of zero day attacks, things may go unidentified for quite a long...
    Get full text
    Thesis
  12. 192
    by Uwadiegwu, Inyama Victor
    Published 2019
    ... there is inadequate security mechanism which an intruder or a man in the middle (MITM) attack can capture...
    Get full text
    Thesis
  13. 193
    by Housain, Anas S.
    Published 2010
    Get full text
    Thesis
  14. 194
    by Mohammed Ismael, Saba
    Published 2018
    .... There is no possibility of an attacker breaking the cipher, as the scheme showed perfect confusion and diffusion...
    Get full text
    Thesis
  15. 195
    by Munther, Munther Numan
    Published 2018
    ... and attackers can easily exploit the inherent security limitation of ARP working principle to penetrate...
    Get full text
    Thesis
  16. 196
    by Mohamed, Kamsiah
    Published 2022
    ... cipher relies on substitution and permutation function to protect the cipher against any attacks...
    Get full text
    Thesis
  17. 197
    by Hasheminejad, Hamidreza
    Published 2015
    ..., computer worms and viruses in the cyberworld. In order to prevent these attacks, technologies...
    Get full text
    Thesis
  18. 198
    by Saleh, Mohammed Abbas Alameen
    Published 2009
    ... is considered not reliable anymore because of its data that can be tampered with by an attacker after conducting...
    Get full text
    Thesis
  19. 199
    by Ali, Siti Hajar Aminah
    Published 2015
    ...) attack. Let say, Company X is selling flowers via online in which the market is from the local...
    Get full text
    Thesis
  20. 200
    ... and infrastructure from attacker internet firewall. The experts believe that Access Points (AP'S) present a large...
    Get full text
    Thesis