Showing 101 - 120 results of 1,198 for search '"Attacker"', query time: 0.04s Refine Results
  1. 101
    by Nordin, Norfarina
    Published 2020
    ...The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has...
    Get full text
    Thesis
  2. 102
    ... medium, WLANs are vulnerable to a myriad of attacks. Although there have been concerted efforts...
    Get full text
    Thesis
  3. 103
    by Mohd Fauzi, Shukor Sanim
    Published 2003
    ... of computer viruses, Trojan horses, worms, and other malicious codes. Computer viruses attacks are problems...
    Get full text
    Thesis
  4. 104
    by Farahmandian, Sara
    Published 2013
    ... the availability of cloud resources comes from Distributed Denial-of Service (DDoS) attack. This kind of attack...
    Get full text
    Thesis
  5. 105
  6. 106
    by Mohammed Ahmed Saad, Redhwan
    Published 2016
    ..., in which ICMP can be blocked or dropped. ICMPv6 opens the door for attackers to attack IPv6 networks...
    Get full text
    Thesis
  7. 107
    by Salih Ali, Nabeel
    Published 2015
    ... applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique...
    Get full text
    Get full text
    Thesis
  8. 108
  9. 109
  10. 110
    by Rohana Abu Kassim
    Published 1998
    Thesis Book
  11. 111
    by Shaukat, Haafizah Rameeza
    Published 2014
    ... them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks...
    Get full text
    Thesis
  12. 112
    by Ali, Sameer
    Published 2021
    ..., it is susceptible to attacker’s Distributed Denial of Service (DDoS) attacks. DDoS attacks are the main causes...
    Thesis
  13. 113
    by Md Ilyas, Siti Sarah
    Published 2017
    ...The number of phishing attacks involving online banking has records an increase percentage over...
    Get full text
    Thesis
  14. 114
    ... of attackers which publicly embarrasses the victim by sharing some personal information of the victim...
    Get full text
    Thesis
  15. 115
    by Mohammed Alhaj, Tagwa Ahmed
    Published 2018
    ...Attack Scenario Construction (ASC) via Alert Correlation (AC) is important to reveal the strategy...
    Get full text
    Thesis
  16. 116
    by Hussein, Safwan Mawlood
    Published 2012
    ...The vast amount of attacks over the Internet makes the computer users and many organizations under...
    Get full text
    Thesis
  17. 117
  18. 118
    by Kordi, Elahe Fazeldeh
    Published 2014
    ... MANET vulnerable to security attacks. Ad hoc On-demand Distance Vector routing (AODV) is one of the best...
    Get full text
    Thesis
  19. 119
  20. 120
    by Abdul Razak, Aina Nabila
    Published 2019
    ... to be protected from any attacks. The malware detection process becomes a challenge because the attacker has a new...
    Get full text
    Thesis