-
1by Kuhanraj, Balan“... serious network threats such as denial of service attack, data modification attack, impersonation attack...”
Published 2020
Get full text
Thesis -
2by Mohd Izwan Zulaini, Abdul Gani“... until 2017 in response to the recovery of the animal populations. Since 1900, crocodile attacks had...”
Published 2019
Get full text
Get full text
Thesis -
3by Yasir, Javed“...). Formal and computational analysis of TLwS shows that it can mitigate replay attack, Man-in-the-Middle...”
Published 2020
Get full text
Thesis -
4by Chanderan, Navein“... of malware are just not enough to combat modern malware attack as it has inherent limitation...”
Published 2019
Get full text
Thesis -
5by Tan, Colin Choon Lin“... phishing attacks. Mainstream solutions and technical approaches for phishing detection suffer from inherent...”
Published 2021
Get full text
Thesis -
6by Faiezah, Abdullah.“... attacked by any biological degradation agents such as fungi, insects and marine borers. There are several...”
Published 2009
Get full text
Thesis -
7by Anes Abdulhadi, Mohammed Jawad“... oxidative stress, which induces ROS, such as 'OH, 02'- and H202 generation, that attack cell components...”
Published 2018
Get full text
Get full text
Thesis -
8