Showing 61 - 80 results of 1,198 for search '"Attacker"', query time: 0.04s Refine Results
  1. 61
    by Hussein, Noor Sabeeh
    Published 2016
    ... kinds of attacks like denial of service attacks, sybil attacks, jamming attacks, black/sink hole attacks...
    Get full text
    Thesis
  2. 62
    Book
  3. 63
    by Kuhanraj, Balan
    Published 2020
    ... serious network threats such as denial of service attack, data modification attack, impersonation attack...
    Get full text
    Thesis
  4. 64
  5. 65
    by Muamer N., Mohammed
    Published 2011
    ... for researches and this connection is prone to vulnerability caused by the attackers in steeling information from...
    Get full text
    Thesis
  6. 66
    by Abadi, Ahad Akbar
    Published 2013
    ... issues still the considerable difficulties for customers. This means the attacks which can threat...
    Get full text
    Thesis
  7. 67
    by Boroujerdizadeh, Ali
    Published 2013
    .... We narrow down the project to a specific attack. Collusion attack is the main problem for video...
    Get full text
    Thesis
  8. 68
    by Hosseini, Seyed Mostafa Mir
    Published 2013
    ... is going to explore integrity attacks in RFID systems. Even though the previous related works have...
    Get full text
    Thesis
  9. 69
    by Aghabababaeyan, Reza
    Published 2015
    .... Robustness is one of the areas to be improved when an attack is implied to watermarked image. One of the main...
    Thesis
  10. 70
    by Kashefi, Iman
    Published 2013
    ... for attackers. Among the leaders in the world of smartphones, Android is a novel platform with rapidly growing...
    Get full text
    Thesis
  11. 71
  12. 72
    by Islam, Amanul
    Published 2017
    Thesis Book
  13. 73
    by Lim, Boon Ping
    Published 2006
    ...Denial of service (DoS) attacks tie up resources of a remote host or network, thereby denying...
    Thesis
  14. 74
    by Ghaben, Ayman Ibrahim Ali
    Published 2023
    ...This thesis proposes an approach to detect HTTP flooding DDoS attacks on web servers. The proposed...
    Get full text
    Thesis
  15. 75
    by Rastegari, Samaneh
    Published 2009
    .... In order to prevent this system from different types of attacks, we need to prepare a classification...
    Get full text
    Thesis
  16. 76
    by Mohd Ariffin, Noor Afiza
    Published 2017
    ... data against all types of attacks. Furthermore, most current research only focuses on improving...
    Get full text
    Thesis
  17. 77
    by Harun, Zati Bayani
    Published 2019
    ... (DDoS) attack which is jamming attack. Almost 81% of jamming attacks are initiated at the MAC layer due...
    Get full text
    Thesis
  18. 78
  19. 79
  20. 80