Showing 341 - 360 results of 1,198 for search '"Attacker"', query time: 0.05s Refine Results
  1. 341
    ... images requires the generation of intricate secret keys that protect the images from diverse attacks...
    Get full text
    Thesis
  2. 342
    by Ibrahim, Ayman Khallel
    Published 2020
    ... making it vulnerable to various threats, such as rogue DHCPv6 server attack and passive attack. Two well...
    Get full text
    Thesis
  3. 343
    by Adeeb, Jnaidi Saed Maher
    Published 2019
    ...Since the period followed the September 11 in 2001 attack, and the second Palestinian uprising...
    Get full text
    Thesis
  4. 344
    by Arab, Farnaz
    Published 2014
    ... metadata of pixels to ensure achievable efficiency to detect more attacks. All these required additional...
    Get full text
    Thesis
  5. 345
    by Fatani, Tariq Abdulaziz D.
    Published 2013
    ... of the experiment was by installing all attack tools in Backtrack 5r4 and rnu it against the smartphone devices...
    Get full text
    Thesis
  6. 346
    by Ismail, Haqi Khalid
    Published 2021
    ..., and impersonation attacks. Cybercriminals can take advantage of insecure communication to perform attacks that lead...
    Get full text
    Thesis
  7. 347
    by Ng, Ke Huey
    Published 2021
    ..., it defeats the original purpose and prompts to be attacked by intruders. This study introduces a hybrid RDWT...
    Get full text
    Thesis
  8. 348
    by Liew, Seow Wooi
    Published 2019
    .... Traditionally, phishing attacks target email, but now they have reached to Online Social Networks (OSNs) like...
    Get full text
    Thesis
  9. 349
    by Alkinany, Enas Akeel Raheem
    Published 2019
    .... However, Spoof attacks remain the main challenge faced by facial biometric systems. A spoof attack arises...
    Get full text
    Thesis
  10. 350
    by Ong, Elaine Ei Ling
    Published 2021
    ... and SHA1 family algorithm can be break by the generic attacks such as Brute Force attack, domain extender...
    Get full text
    Thesis
  11. 351
    by Wan Ali, Wan Nor Ashiqin
    Published 2015
    ... several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6...
    Get full text
    Thesis
  12. 352
    by Choong, Kai Bin
    Published 2018
    ...”. Text-based CAPTCHA is the most common technique used across the internet to detect bot from attacking...
    Get full text
    Thesis
  13. 353
    by Krishnan, Ashvini Devi
    Published 2013
    .... Security specification languages can be used to represent security specification such as attack...
    Thesis
  14. 354
    by Ahmad Zahari, Nurul Huda
    Published 2011
    ... based on times and attacks. If there is no attack or intrusion detected, MPM will wait...
    Get full text
    Get full text
    Get full text
    Thesis
  15. 355
    by Noor Zuraidin, Mohd Safar
    Published 2011
    ... anomalies are identified, abnormal DNS packet request, the NetBIOS attack, abnormal DNS MX query, DNS...
    Get full text
    Get full text
    Thesis
  16. 356
    by Mokhtar, Ridwan
    Published 2006
    ... model and the three-dimensional results. The effects of angles of attack and aerofoil profiles were...
    Get full text
    Thesis
  17. 357
    by Chin, Ji Jian
    Published 2014
    ....’s open problem of whether the Beth IBI scheme is secure against active/concurrent attacks and a result...
    Thesis
  18. 358
    ... of protocol. The formal analysis of LEMAP proves that it can mitigate replay attack, Man-in-the-Middle (MITM...
    Get full text
    Thesis
  19. 359
    by Mahmoud Al-Emari, Salam Radi
    Published 2022
    ... to light due to the existing attacks that targeted Ethereum, for instance, the Ethereum DAO attack...
    Get full text
    Thesis
  20. 360