Showing 1 - 20 results of 1,278 for search '"Attacker"', query time: 0.03s Refine Results
  1. 1
  2. 2
    by Zhang, Yongjun
    Published 2001
    Thesis Book
  3. 3
  4. 4
  5. 5
  6. 6
    by Chan, Kah Wai
    Published 2021
    ...The concrete structures subject to aggressive environment under sulphate attack is of key...
    Get full text
    Thesis
  7. 7
    by Mohd. Ghazzali, Amalina
    Published 2008
    ...This study of web worms attack on web application can be implemented to enhance the security...
    Get full text
    Thesis
  8. 8
  9. 9
    by Li, Ying
    Published 2002
    Thesis Book
  10. 10
    by Raenu Kolandaisamy
    Published 2020
    Get full text
    Thesis Book
  11. 11
    by Haron, Haliza
    Published 2015
    ... to the attackers. This study will focus on jamming attack and the case study has been done at Kolej Komuniti Masjid...
    Get full text
    Get full text
    Thesis
  12. 12
    ...Plaintext Recovery Attack is a new attack in security system world. It was discovered lately...
    Get full text
    Thesis
  13. 13
    by Sanaei, Mojtaba Ghanaatpisheh
    Published 2013
    ..., selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One...
    Get full text
    Thesis
  14. 14
    by Khan, Muhammad Murad
    Published 2013
    ... In The Middle can observe key exchange messages and can setup MITM attack between communication. Security...
    Get full text
    Thesis
  15. 15
    by Siew, Hong Wei
    Published 2013
    ...The main aims of this study are divided into, firstly, a generic model of crosstalk attack and its...
    Thesis
  16. 16
    by Askarin, Mohammad Mogharen
    Published 2018
    Thesis Book
  17. 17
    by Alahmadi, Ahmed Mohammed A.
    Published 2018
    ... to achieve these vital features the Bitcoin system should be provably secure against the attacks. Many...
    Get full text
    Thesis
  18. 18
    by Mohd Jaafar, Fatin Haziqah
    Published 2013
    ...This study is about termite attack at historical building, where it is involves a conservation work...
    Get full text
    Thesis
  19. 19
    ...Static cyphers use static transformations for encryption and decryption. Therefore, the attacker...
    Get full text
    Thesis
  20. 20
    by Apandi, Mohamad Aiman Hanif
    Published 2019
    ...In the wireless network, there is an attack called Wormhole attack that capable in confusing...
    Get full text
    Thesis