Showing 41 - 60 results of 1,198 for search '"Attacker"', query time: 0.04s Refine Results
  1. 41
    by Modirkhazeni, Ali
    Published 2011
    ... of conventional techniques of attack and the attacks that are not desirable because of limited resources is a...
    Get full text
    Thesis
  2. 42
    ... and attacks on the routing protocols in the MANET. One of the critical threats is the wormhole attacks, which...
    Get full text
    Thesis
  3. 43
    by Elejla, Omar E. O.
    Published 2018
    ... in IPv6 native networks. IPv6 is vulnerable to a number of attacks from IPv4, besides new attacks have...
    Get full text
    Thesis
  4. 44
    by Omar, Mohd Nizam
    Published 2011
    ... to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation...
    Get full text
    Thesis
  5. 45
    by Jantan, Mohd. Faidzal
    Published 2010
    .... Far from that, Algebraic Attacks and Fast Algebraic Attack has become popular among cryptographers...
    Get full text
    Thesis
  6. 46
  7. 47
    by Ibrahim, Husam Hamid
    Published 2018
    ... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...
    Get full text
    Get full text
    Get full text
    Thesis
  8. 48
    by Ridha, Hussein Ali
    Published 2020
    ... communication from malicious attacks. The data is enabled to be received by the recipients. The data is delayed...
    Get full text
    Get full text
    Get full text
    Thesis
  9. 49
    by Ibrahim, Husam Hamid
    Published 2018
    ... area units were usually hindered by the constant threat from numerous kinds of attacks. One such attack...
    Get full text
    Get full text
    Get full text
    Thesis
  10. 50
    by Lau, Wei Khang
    Published 2016
    ... applied to digital files to withstand against cropping and resizing attack. In this Dual-watermarking...
    Get full text
    Get full text
    Get full text
    Thesis
  11. 51
    by Mohd Salleh, Nurhashikin
    Published 2018
    ... uses the Internet as their platform to form online communities and launch their attack...
    Get full text
    Get full text
    Thesis
  12. 52
    by Ho, Peng Foong
    Published 2014
    Thesis Book
  13. 53
    by Qadijah Adzmir
    Published 2019
    Thesis Book
  14. 54
  15. 55
    by Zhang, Zijun
    Published 1998
    Thesis Book
  16. 56
    by Chee, Kok Onn
    Published 2013
    Thesis Book
  17. 57
    by Izaddoost, Alireza
    Published 2008
    ... to its intended users. The Denial of Service (DoS) attacks are becoming more serious in security...
    Get full text
    Thesis
  18. 58
    by Ghobadifar, Faranak
    Published 2015
    ... in the fields. The main purpose of this research was to determinate pest attack in paddy field using remote...
    Get full text
    Thesis
  19. 59
    by Ahmed, Dana Hasan
    Published 2017
    ... Reflection Denial of Service (DRDoS) attacks which are called Reflection/Amplification and hassles...
    Get full text
    Thesis
  20. 60
    by Javan, Ali
    Published 2011
    ... threats including coordinated distributed attacks have flourished against the vital services and priceless...
    Get full text
    Thesis