Showing 321 - 340 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 321
    by Siswanto, Apri
    Published 2022
    ... assess the systems, fingerprints could be replicated and modified by attackers. Currently, most existing...
    Get full text
    Get full text
    Thesis
  2. 322
    by Al-Alak, Saif M. Kh.
    Published 2014
    ... key for message ciphering that leads to the possibility of key attack. The authentication algorithm...
    Get full text
    Thesis
  3. 323
    by Ghathwan, Khalil Ibrahim
    Published 2016
    ...Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks...
    Get full text
    Get full text
    Thesis
  4. 324
    by Revathy, Amadera Limgam
    Published 2019
    ... found on Malaysian videos are political attack and racial attack. Other subcategories include name...
    Get full text
    Get full text
    Thesis
  5. 325
    by Mushgil, Baydaa Mohammad
    Published 2016
    ... signal processing and manipulating attacks specially the de-synchronization attacks such as jittering...
    Get full text
    Thesis
  6. 326
    by Mohd Nor, Mohd Khairi
    Published 2012
    ... vital policy for users and organization since most commonly attack launched because of the vulnerability...
    Get full text
    Thesis
  7. 327
    by Essa, Shawnim Ikram
    Published 2013
    ... banking has given rise to an increase in attacks against banking institutions and their customers...
    Get full text
    Thesis
  8. 328
    by Mnati, Mustafa Nasser
    Published 2010
    ..., but the problem of robustness and transparency from any attack is still becomes the main research issue...
    Get full text
    Thesis
  9. 329
    by Daud, Muhamad Azlan
    Published 2014
    ... input. Alvarez through his one-time pad attack successfully attacked the Baptista cyptosystem. Ariffin...
    Get full text
    Thesis
  10. 330
    by Altaf, Afaq
    Published 2011
    Get full text
    Thesis
  11. 331
  12. 332
  13. 333
    by Shojanazeri, Hamid
    Published 2013
    ... as watermarks to provide malicious attack classification and locating tampered area. The Zernike moments...
    Get full text
    Thesis
  14. 334
    ...Phishing attack detection is a significant research area for network security applications...
    Get full text
    Get full text
    Get full text
    Thesis
  15. 335
    by Anwar, Shahid
    Published 2019
    ... coordinated attacks including spam emails, click frauds, bitcoins mining, distributed denial of service...
    Get full text
    Thesis
  16. 336
    ...-based methods, while in automated methods the robustness against intentional or unintentional attacks...
    Get full text
    Thesis
  17. 337
    by Ordi, Ali
    Published 2016
    ... in preventing Denial of Service (DoS) attacks. A ‘Connection Request Flooding’ DoS (CRF-DoS) attack is launched...
    Get full text
    Thesis
  18. 338
    ... attacks. This research investigates the use of a promising technique from machine learning to designing...
    Get full text
    Get full text
    Thesis
  19. 339
    by Mohamad Fadli, Zolkipli
    Published 2012
    ...-day attacks, malware avoidance techniques and hybrid malware are highlighted. Furthermore, a common...
    Get full text
    Thesis
  20. 340
    by Rosli, Athirah
    Published 2017
    .... The developed equation was validated via experimentation that involved testing the UDP flooding attack, TCP...
    Get full text
    Thesis