Showing 421 - 440 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 421
    by Majid, Gelareh
    Published 2014
    ... image, is one of the frequently used techniques. Adding different type of attack such as noise...
    Thesis
  2. 422
    by Khor, Jing Huey
    Published 2013
    ... attacks is proposed as a prevention mechanism. The proposed protocol is designed with lightweight...
    Get full text
    Thesis
  3. 423
    by Melhim, Loai Kayed Hassan Bani
    Published 2012
    ... the Internet. This has shifted the focus of cyber attackers from curiosity to financial gain. Attackers use...
    Get full text
    Thesis
  4. 424
    by Mohamad, Musfa
    Published 2005
    ... to investigate whether chemical attack in limestone aggregate is the source of problem for sub structure...
    Get full text
    Thesis
  5. 425
    by Yaakub, Mohd Fauzi
    Published 2011
    ... (BET) was applied to scrutinize the lift force and angle of attack distribution along the helicopter...
    Get full text
    Thesis
  6. 426
    by Behna, Rouzbeh
    Published 2013
    ... addressing the private key escrow problem at the same time. Firstly, two attacks are mounted on an efficient...
    Thesis
  7. 427
    by Oyekola, Ayoola Gabriel
    Published 2023
    ... of the candidate's capacity cum propriety and positive reaction to policy implementation and projection. Attack...
    Get full text
    Get full text
    Thesis
  8. 428
    by Chaeikar, Saman Shojae
    Published 2010
    ... for generating, distributing, and finally revoking keys. Many attacks endanger security of key management in each...
    Get full text
    Thesis
  9. 429
    by Saeed, Auday H.
    Published 2015
    ... the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking...
    Get full text
    Thesis
  10. 430
    by Nematollahi, Mohammad Ali
    Published 2015
    ...) and Lifting Wavelet Transform (LWT) with SVD, against different attacks such as filtering, additive noise...
    Get full text
    Thesis
  11. 431
    by Thamer, Khalil Esmeel
    Published 2020
    .... With the technological advancement, the attackers have been developing new methods from time to time to gain access...
    Get full text
    Thesis
  12. 432
    by Usman, Jamilu
    Published 2015
    ... was studied in terms of resistance to sulfuric acid attack, sulfates attack and at high temperatures...
    Get full text
    Thesis
  13. 433
  14. 434
    by Tanha, Maryam
    Published 2013
    ... automatic response and self-healing capabilities to handle multifarious malicious attacks while remaining...
    Get full text
    Thesis
  15. 435
  16. 436
    by Elfera, Polly
    Published 2016
    ... of Kapur bukit attacked by insect pest. The common leaf damages on Engkabang jantong tree was ‘hole damage...
    Get full text
    Thesis
  17. 437
    by Awadallah, Ruba N S
    Published 2022
    ... attack (IND-CCA2) because of their malleable nature. Moreover, the client (data owner) cannot prove...
    Get full text
    Thesis
  18. 438
    by Salem Hussin, Saleh Hussin
    Published 2005
    ... message. Image is the watermark channel or carrier. Image pixels and possible attacks on marked image...
    Get full text
    Thesis
  19. 439
    by Mandala, Satria
    Published 2005
    ..., the nodes become susceptible from several network attacks such as address spoofing, Distributed Denial...
    Get full text
    Thesis
  20. 440
    by Mat Sidek, Abd. Rahim
    Published 2006
    ... to determine their characteristics. The analysis consists; statistical test, correlation attack, linear...
    Get full text
    Thesis