Showing 301 - 320 results of 1,221 for search '"Attacker"', query time: 0.04s Refine Results
  1. 301
    by Noorlaily Izwana Ibrahim
    Published 2012
    ... to the users. The term “malvertising” comes from the word malware and advertising. It is one type of attack...
    Get full text
    Thesis
  2. 302
    by Sarhan, Ali Raheem
    Published 2015
    ... Reynolds number airfoils were used to design air catchers with three angles of attack and four different...
    Get full text
    Get full text
    Get full text
    Thesis
  3. 303
    by Ahmad, Miza Mumtaz
    Published 2011
    ... is close to nil. However, it is easier to attack the key generation protocol using less complicated attack...
    Get full text
    Thesis
  4. 304
    by Taqiyah Khadijah, Ghazali
    Published 2023
    ... and privacy. Moreover, this also increases the probability of privacy leakage which lead to attacks...
    Get full text
    Get full text
    Thesis
  5. 305
    by Valashani, Pouya Bagherpour
    Published 2013
    ... are studied: attacking cash machine, cashier’s attacking and making the store messy. In implementing...
    Get full text
    Thesis
  6. 306
    by Al-Aswer, Faisal Saleh Nasser
    Published 2017
    ... to OWASP 2013 security report, Cross Site Scripting came in third place. Cross Site Scripting is an attack...
    Get full text
    Thesis
  7. 307
    ...The evolutions of computer network attacks have urged many organizations to install multiple...
    Get full text
    Thesis
  8. 308
    by Hamood, Sabah Fadhel
    Published 2013
    ... and security against attacks. In this study Fibonacci numbers have been exploited to achieve these goals...
    Get full text
    Thesis
  9. 309
    by Mohd Nor, Mohd Aliff
    Published 2009
    ... of attack with reference to drag and lift coefficient. The aim of this project is to compare the aerodynamic...
    Get full text
    Thesis
  10. 310
    by Hashim, Md Nazri
    Published 2005
    ...Exploitation by attackers whose have breached the network security of some of the world's most...
    Get full text
    Thesis
  11. 311
    by Ismail, Izaitul Aida
    Published 2021
    .... Rhinoceros beetle (Oryctes rhinoceros) was a major pest and attacked both type of palma. This pest attacked...
    Get full text
    Thesis
  12. 312
    by Mokhtar, Mohd. Zaki
    Published 2006
    .... The major factor for concrete deterioration is carbonation (85%), chloride attack (9%), sulphate attack (3...
    Get full text
    Thesis
  13. 313
    by Hamid Ali, Firkhan Ali
    Published 2004
    ...Exploitation by attackers whose have breached the network security of some of the world's most...
    Get full text
    Thesis
  14. 314
    by Yap, Wun She
    Published 2015
    ... and thus cannot be regarded as an ideal cipher. We also present the first known cryptanalytic attack against...
    Thesis
  15. 315
    by Mohamed, Nur Nabila
    Published 2019
    ... lacks of access control mechanism and no protection from Man In The Middle (MITM) attack. The security...
    Get full text
    Thesis
  16. 316
    by Engliman, Muhammad Ariff
    Published 2014
    ... or passing made towards obtaining field goals or penalty comers won by the attacking team. Longer passing...
    Get full text
    Thesis
  17. 317
    by Yaseen, Ahmed Hasani
    Published 2020
    ... the functional strategies (i.e. acclaim, attack, and defence that are based on topics) which are used by both...
    Get full text
    Thesis
  18. 318
    by Lam, Shi Xiang
    Published 2013
    ... diferent types of attack, namely attack based on removal of vertices from the network and attack...
    Get full text
    Thesis
  19. 319
    by Ahmad Ghazali, Lizal Iswady
    Published 2012
    ... result, it is vulnerable to Eavesdropping attack. This leads many works on practical protocol...
    Get full text
    Thesis
  20. 320