Showing 141 - 160 results of 215 for search '"Attacker"', query time: 0.05s Refine Results
  1. 141
    by Thabit, Reema Ahmed Abdalla
    Published 2022
    ... text steganography to protect against visual and statistical attack issues....
    Get full text
    Thesis
  2. 142
    by Gana, Modu Lawan
    Published 2019
    ... both in terms of attack frequencies and fatalities rate in communities. This study therefore...
    Get full text
    Thesis
  3. 143
    by Abubakar, Saidu Isah
    Published 2018
    ..., k, ks, and zs. Furthermore, this research work develops four successful cryptanalysis attacks...
    Get full text
    Thesis
  4. 144
    by Hoe, Pik Kheng
    Published 2010
    ... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...
    Get full text
    Thesis
  5. 145
    by Hoe, Pik Kheng
    Published 2010
    ... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...
    Get full text
    Thesis
  6. 146
    by Tey, Sheik Kyin
    Published 2018
    ... of currency crisis and supports the first-generation model of speculative attacks; (5) the responses...
    Get full text
    Thesis
  7. 147
  8. 148
    by Khan, Muhammad Rahim
    Published 2003
    ... and increase polynomial. Temperature variation had affected all the components viz. instantaneous attack rate...
    Get full text
    Thesis
  9. 149
    by Way, Chiang Poh
    Published 2006
    ... response to fungal attack. This response has been hypothesized to play an important role in determining...
    Get full text
    Thesis
  10. 150
    by Lim, Kean Jin
    Published 2006
    ... fungal attack did not involve individual gene. Additionally, many clones encoding proteins with unknown...
    Get full text
    Thesis
  11. 151
    by Abkooh, Elaheh Taheri
    Published 2016
    ... is the sixth most susceptible country in the world to cyber-risks, in the form of malware attacks via computer...
    Get full text
    Thesis
  12. 152
    by Zaini, Lukmanul Hakim
    Published 2013
    ... and bleached fibres because of the acid attacked the crystalline region. Thermogravimetric analysis (TGA...
    Get full text
    Thesis
  13. 153
    by Torshizi, Seyed Dawood Sajjadi
    Published 2013
    ..., in the existence of any malicious activity such as UDP food or DoS (Denial of Service) attacks by mesh stations...
    Get full text
    Thesis
  14. 154
    by Yusoff, Sofia Hayati
    Published 2014
    ...In portraying Islam especially after the September 11 attacks, a number of studies found...
    Get full text
    Thesis
  15. 155
    by Zakaria, Nur Hafiza
    Published 2016
    ... in cryptanalysis using branch number in estimating the possible success of differential and linear attacks. Based...
    Get full text
    Thesis
  16. 156
    by Rayung, Marwah
    Published 2014
    ... susceptible to microbial attacked, therefore the addition of fiber helps to accelerate the degradation...
    Get full text
    Thesis
  17. 157
    ...), Yasmina Khadra’s The Attack (2007), Thomas Lee Howell’s Martyr (2015), and Gabriella Ambrosio’s...
    Get full text
    Thesis
  18. 158
    ... losses, including drought conditions or susceptibility to pest and pathogen attacks. The steady...
    Get full text
    Thesis
  19. 159
    by Muhasin, Haifaa Jassim
    Published 2019
    ..., management and internal attacks. These issues have become a major challenge in using the cloud, especially...
    Get full text
    Thesis
  20. 160
    by Linatoc, Alona Cuevas
    Published 1999
    ... by wild pigs, while death of big trees was caused by termite attack. Taxonomic review of the genus...
    Get full text
    Thesis