Showing 281 - 300 results of 1,198 for search '"Attacker"', query time: 0.04s Refine Results
  1. 281
    by Yahaya, Zulkifli
    Published 2005
    ... between the two airfoils. The effects of Reynolds numbers, angles of attack, and airfoil profiles...
    Get full text
    Thesis
  2. 282
    by Parveen, Sajida
    Published 2016
    ... threats, one of them is spoofing attacks. A spoofing attack occurs when a person tries to masquerade...
    Get full text
    Thesis
  3. 283
    by Bakhdlaghi, Yousef Abdullah
    Published 2020
    ... the discovery of large-scale and coordinated attacks. Although existing CIDN offers consultation capability...
    Get full text
    Thesis
  4. 284
    by Dak, Ahmad Yusri
    Published 2019
    ... to being vulnerable to jamming attacks. A study found that eighty one percent of attacks occurs...
    Get full text
    Thesis
  5. 285
    by Soleymani, Seyed Ahmad
    Published 2019
    ... patterns of attacks such as simple attack, opinion tampering attack, and cunning attack. In conclusion...
    Get full text
    Thesis
  6. 286
    by Haratian, Mohammad Hossein
    Published 2009
    ... number of efforts have concentrated on handling the vast variety of security attacks. The characteristic...
    Get full text
    Thesis
  7. 287
    ... that can achieve consistent results when employed for the detection of multiple attack types. Hence...
    Get full text
    Thesis
  8. 288
    by Yaribakht, Amir Hesam
    Published 2020
    ... that can be robust against common image processing attacks such as JPEG compression, rotation, sharpening...
    Get full text
    Thesis
  9. 289
  10. 290
    by Pang, Kok An
    Published 2021
    ... against side channel cube attack is also presented in this thesis. For most of the secret keys, by reading...
    Get full text
    Get full text
    Thesis
  11. 291
    Thesis Book
  12. 292
    by Behnia, Armaghan
    Published 2013
    ... period of validity it may compromise through brute force attacks or dictionary attacks. In order to come...
    Get full text
    Thesis
  13. 293
    by Mustafa, Intan Shafinaz
    Published 2006
    ...) open to the potential attacks during transmission. Recipients required a mechanism which can prove...
    Get full text
    Thesis
  14. 294
    by Dhahir, Saif Mahmood
    Published 2017
    ..., dynamic, infrastructure-less and self-organizing, MANETs are vulnerable to several kinds of attacks...
    Get full text
    Thesis
  15. 295
    by Noorlaily Izwana Ibrahim
    Published 2012
    ... to the users. The term “malvertising” comes from the word malware and advertising. It is one type of attack...
    Get full text
    Thesis
  16. 296
    by Sarhan, Ali Raheem
    Published 2015
    ... Reynolds number airfoils were used to design air catchers with three angles of attack and four different...
    Get full text
    Get full text
    Get full text
    Thesis
  17. 297
    by Ahmad, Miza Mumtaz
    Published 2011
    ... is close to nil. However, it is easier to attack the key generation protocol using less complicated attack...
    Get full text
    Thesis
  18. 298
    by Taqiyah Khadijah, Ghazali
    Published 2023
    ... and privacy. Moreover, this also increases the probability of privacy leakage which lead to attacks...
    Get full text
    Get full text
    Thesis
  19. 299
    by Valashani, Pouya Bagherpour
    Published 2013
    ... are studied: attacking cash machine, cashier’s attacking and making the store messy. In implementing...
    Get full text
    Thesis
  20. 300
    by Al-Aswer, Faisal Saleh Nasser
    Published 2017
    ... to OWASP 2013 security report, Cross Site Scripting came in third place. Cross Site Scripting is an attack...
    Get full text
    Thesis