Showing 441 - 460 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 441
    by Aslahi, Bibi Masoomeh
    Published 2013
    ... on labeled training data, generally cannot detect novel attacks. The purpose of this study is to improve...
    Get full text
    Thesis
  2. 442
    by Mat Deli, Mohd. Sharudin
    Published 2017
    ... the computer and internet users from exposing themselves towards malware attacks, identifying the attacks...
    Get full text
    Thesis
  3. 443
    by Afrakhteh, Masoud
    Published 2010
    ... to be robust against one of the common attacks to stego-images known as Chi-squared attack....
    Get full text
    Thesis
  4. 444
    .... The used of IDS to prevent the extremely sophisticated attacks in most of our industries, governmental...
    Get full text
    Thesis
  5. 445
    by Al-Saedi, Karim Hashim Kraidi
    Published 2013
    ... of the threat they pose. Therefore, it is difficult for the security analyst to identify attacks and take...
    Get full text
    Thesis
  6. 446
    by Khiabani, Hamed
    Published 2013
    ... works showed that the accuracy of the model improved from 2% to 41.3% during an oscillating attack...
    Get full text
    Thesis
  7. 447
    by Zarir, Mustafa Nadhim
    Published 2018
    ... it additionally corresponds to attacks on pc systems. The distinguishing actions that mitigate the operations...
    Get full text
    Get full text
    Get full text
    Thesis
  8. 448
    ... to learn systems’ specifications and extract general state-based rules for attacks identification...
    Get full text
    Thesis
  9. 449
    by Mohd. Shariff, Muhammad Reza
    Published 2008
    ... disgruntle staffs, hackers, virus attack, or even corporate espionage. At any corporate network, a number...
    Get full text
    Thesis
  10. 450
    by Ng, Wui Ming
    Published 2007
    ... in the development of plant protection scheme against phytopathogenic attacks from fungi and insects. Bacteria...
    Get full text
    Get full text
    Thesis
  11. 451
  12. 452
    by Elebe, Talib Muhsen
    Published 2017
    ... to the increase of natural disasters, armed conflicts or terrorist attacks. It presents great challenges...
    Get full text
    Get full text
    Thesis
  13. 453
  14. 454
    by Rafsanjani, Ahmad Sahban
    Published 2023
    ... attackers spread malicious URLs to carry out attacks such as phishing and malware, which lead unsuspecting...
    Get full text
    Thesis
  15. 455
    by Asri, Ahmad Azlan
    Published 2010
    ... (v), height of spoiler (h), and angle of attack (a). The car then will simulated without using rear...
    Get full text
    Thesis
  16. 456
    by Daud, Rohaizan
    Published 2005
    ... of denial-of-service hacker attacks on the most popular and established of Internet sites has led to a...
    Get full text
    Thesis
  17. 457
    by Usmani, Mohammed Umar
    Published 2016
    ... of concrete incorporating PET fibers from recycled bottle wastes and was exposed to acid and sulphate attack...
    Get full text
    Thesis
  18. 458
    by Nasser, Alzahrani Jalal
    Published 2013
    ... types of attacks is applied on watermarked image namely, Gaussian noise, Salt & Pepper Noise, Poisson...
    Thesis
  19. 459
    by Aslahi Shahri, Bibi Masoomeh
    Published 2013
    ... on labeled training data, generally cannot detect novel attacks. The purpose of this study is to improve...
    Get full text
    Thesis
  20. 460
    by Sanati, Parisa
    Published 2013
    ... changes were occurred on their structures. Strong acidic condition in SGF created an acidic attack to Si-O...
    Get full text
    Thesis