Showing 461 - 480 results of 1,221 for search '"Attacker"', query time: 0.04s Refine Results
  1. 461
    by Kadhim, Karrar Abdul Ameer
    Published 2013
    ..., six types of attacks are applied on watermarked image namely, Gaussian noise, Salt & Pepper Noise...
    Get full text
    Thesis
  2. 462
    by Soltanmohammadi, Saeed
    Published 2013
    ... records. Accessing HIS data through the internet make it more vulnerable to data lost, misuses and attacks...
    Get full text
    Thesis
  3. 463
    by Norlaila Razali
    Published 2011
    ... in the attacking position showed improvement of 4 jumps compared to other playing positions. The 10 Meter Shuttle...
    Get full text
    thesis
  4. 464
  5. 465
    by Go, Bok Min
    Published 2006
    ... to exploit their special properties/weaknesses to attack public-key-based security protocols....
    Thesis
  6. 466
    by Ahmad, Aini
    Published 2017
    ...DDos - is a volumetric attack that comes from multiple sources toward a targeted object (website...
    Get full text
    Thesis
  7. 467
    by Muhamad Affandi, Ismail
    Published 2009
    ... at workplace. Types of bullying on this study are personal attack,physical threats, work-related...
    Get full text
    Get full text
    Thesis
  8. 468
    by Abdul Wahid, Mohammed N.
    Published 2016
    ... transmitted on high speed communications links for errors and attackers’ detection and signal integrity...
    Get full text
    Thesis
  9. 469
    by NURFARAHIN, AJLAN
    Published 2022
    ... (Symington) Kosterm, towards fungal decay and termite attack with and without extractives content, (ii...
    Get full text
    Thesis
  10. 470
    by Mohd Nasir, Rinie Narinie
    Published 2015
    ... (PNS) attack compared to Bennet and Brassard 1984 (BB84) protocol. It is more likely...
    Get full text
    Thesis
  11. 471
    by Che Yusof, Nik Syamsul Bahari
    Published 2014
    ... as the violent and critical attacks by cavitation can cause a lot of damage to ball valves. The damage in term...
    Get full text
    Thesis
  12. 472
    by Choo, Jeffrey Soon Fatt
    Published 2015
    ...Phishing attack is a cybercrime which will result in severe financial losses to consumers...
    Get full text
    Thesis
  13. 473
    by Irfan Abu Hassan, Nur Muhammad
    Published 2020
    ... occurred in the system such as Distributed Denial of Services’ (DDoS) attack which possess difficulty when...
    Get full text
    Thesis
  14. 474
    by Abdul Satar, Azwan
    Published 2007
    ... to these networks. A large portion of these treats are in the form of spoof attacks. Spoof attacks involve...
    Get full text
    Thesis
  15. 475
    by Liew, Jiun Terng
    Published 2019
    ... card used also raises the concern of resources availability due to selfish attack. Therefore, work...
    Get full text
    Thesis
  16. 476
    by Erica Dina, Erica Dina
    Published 2006
    ... of reinforcement corrosion are carbonation and chloride ions attack. Acid and sulphate attack can also weaken...
    Get full text
    Thesis
  17. 477
    by Balakrishnan, Balamohan
    Published 2014
    ... better resistance to destructive chemical penetration and attacks such as chloride, acid and sulphate...
    Get full text
    Thesis
  18. 478
    by Muhamad, Rafidah
    Published 2020
    ... challenges in detecting tampered region with the presence of all these post-processing attacks in a copy-move...
    Get full text
    Thesis
  19. 479
    ... sure the embedding watermark is undetectable by the human eye, robust against common attack...
    Get full text
    Thesis
  20. 480
    by Samian, Normalia
    Published 2010
    ... on, the nodes operate in promiscuous mode and are vulnerable to attacks and service disruption especially from...
    Get full text
    Thesis