Showing 261 - 280 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 261
  2. 262
    by Irshad, Hira
    Published 2020
    .... The equity markets in Pakistan respond negatively to attacks on educational institutes and businesses whereas...
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 263
    by Abdulbari Ali, Sherif
    Published 2005
    .... Attacks against simplified variants of the AES algorithm have been reported for 128-bit keys, 7 rounds...
    Get full text
    Thesis
  4. 264
    by Mat Isa, Mohd Anuar
    Published 2018
    ... the security of embedded systems in recent years due to the emergence of IoT, and the proliferation of attacks...
    Get full text
    Thesis
  5. 265
    by Hamdi, Ayman Majid
    Published 2019
    ... important. Currently, static substitution boxes (S-Boxes) are vulnerable to data and subkey attacks...
    Get full text
    Thesis
  6. 266
    by Al-Rimy, Bander Ali Saleh
    Published 2019
    .... Even after neutralizing such attacks, the targeted files remain encrypted. This irreversible effect...
    Get full text
    Thesis
  7. 267
    by Juliza, Mohamad Arif
    Published 2022
    .... The openness of the Android mobile devices is extremely vulnerable to malware attacks. Even though various...
    Get full text
    Thesis
  8. 268
    by Baharudin, Muhammad Saufi
    Published 2009
    .... By using massive attack of zombie, the attackers launch a distribution denial of services (ddos) against...
    Get full text
    Thesis
  9. 269
    by Gaithuru, Juliet Nyokabi
    Published 2013
    ... ways of attacking the algorithms used for encryption. This process of continued improvement...
    Get full text
    Thesis
  10. 270
    by Kalybayev, Almukhammed
    Published 2013
    ... years, potentially leading to a loss of cash. The methods which are utilized by attackers to collect...
    Get full text
    Thesis
  11. 271
    by Mokaramian, Shahram
    Published 2013
    ...2R classes, which include malicious attacks. Therefore, it requires a resampling technique...
    Get full text
    Thesis
  12. 272
    by Kamarudin, Nazhatul Hafizah
    Published 2018
    ... threatened by security attacks. It is noted that the use of username and password as an authentication scheme...
    Get full text
    Thesis
  13. 273
    by Yaakub, Mohd Fauzi
    Published 2019
    ...The issue of high angle of attacks at the retreating blade receives attention from countless...
    Get full text
    Get full text
    Get full text
    Thesis
  14. 274
  15. 275
    by Omotunde, Habeeb Oladapo
    Published 2018
    ...As SQL injection attack (SQLIA) continues to threaten web applications despite several techniques...
    Get full text
    Get full text
    Get full text
    Thesis
  16. 276
    by Eid, Almazrooie Mishal
    Published 2018
    ...Asymmetric and symmetric cryptography are believed to be secure against any attack using classical...
    Get full text
    Thesis
  17. 277
    by Buja, Alya Geogiana
    Published 2018
    ... of block ciphers against side-channel cube attack and differential fault analysis.Thirdly,all proposed...
    Get full text
    Get full text
    Thesis
  18. 278
    by Hina, Aliyu Danladi
    Published 2019
    ... against fast correlation attack, one of the major attacks known to weaken nonlinear combiner...
    Get full text
    Thesis
  19. 279
    by Juremi, Julia
    Published 2018
    ... cryptographic attacks. Somehow, the substitution box (s-box) in the AES block cipher is fixed or static for all...
    Get full text
    Thesis
  20. 280
    by Teh, Jia Yew
    Published 2017
    ... to malicious, undesirable effects such as buffer overflows, privilege escalation (spawning an attackers’ shell...
    Get full text
    Thesis