Showing 241 - 260 results of 1,198 for search '"Attacker"', query time: 0.04s Refine Results
  1. 241
    ..., Port Scan Attack and Smurf Attack Detection. The approach is to develop software which performs port...
    Get full text
    Get full text
    Thesis
  2. 242
    ...The growth of the Internet and networking has made securing networks against attacks a very...
    Get full text
    Thesis
  3. 243
    by Khalid Hassan, Mohamed Edris
    Published 2016
    ...This thesis addresses the issue of image watermarking robustness against attacks and especially...
    Get full text
    Thesis
  4. 244
  5. 245
  6. 246
    ...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...
    Get full text
    Thesis
  7. 247
    by Ibrahim, Mohammed
    Published 2021
    ... of people’s lives. However, most IoT devices are vulnerable to botnet attacks. To defend these devices...
    Get full text
    Thesis
  8. 248
    by Mohamed, Ashara Banu
    Published 2015
    ..., one of the main issues that still remains since its beginning is the huge amount of attack alerts...
    Get full text
    Thesis
  9. 249
    by Ali Mohamed, Nachaat Abdelatif
    Published 2022
    ... organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent...
    Get full text
    Thesis
  10. 250
    by Yunanto, Sri
    Published 2013
    ...This thesis attempts to analyze the involvement of militant Islamist groups in terror attacks...
    Get full text
    Thesis
  11. 251
    by Farrokhtala, Ali
    Published 2013
    ... principles but still there is not any approved standard in this field. Black hole attack as one of the most...
    Get full text
    Thesis
  12. 252
    by Omar @ Othman, Wan Zariman
    Published 2019
    ...Algebraic attacks on stream cipher are important in cryptanalysis to both design- ers...
    Get full text
    Thesis
  13. 253
    by Daud, Ali Yusny
    Published 2002
    ...) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form...
    Get full text
    Thesis
  14. 254
    by Hydara, Isatou
    Published 2015
    ... of an application. The presence of XSS vulnerabilities in applications source codes enables XSS attacks to take...
    Get full text
    Thesis
  15. 255
    by Asmawi, Aziah
    Published 2016
    ... become increasingly vulnerable to malicious attacks that could affect essential properties...
    Get full text
    Thesis
  16. 256
  17. 257
    by Irshad, Hira
    Published 2020
    .... The equity markets in Pakistan respond negatively to attacks on educational institutes and businesses whereas...
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 258
    by Abdulbari Ali, Sherif
    Published 2005
    .... Attacks against simplified variants of the AES algorithm have been reported for 128-bit keys, 7 rounds...
    Get full text
    Thesis
  19. 259
    by Mat Isa, Mohd Anuar
    Published 2018
    ... the security of embedded systems in recent years due to the emergence of IoT, and the proliferation of attacks...
    Get full text
    Thesis
  20. 260
    by Hamdi, Ayman Majid
    Published 2019
    ... important. Currently, static substitution boxes (S-Boxes) are vulnerable to data and subkey attacks...
    Get full text
    Thesis