Showing 101 - 120 results of 215 for search '"Attacker"', query time: 0.05s Refine Results
  1. 101
    by Partowazar, Baharak
    Published 2016
    ... these factors, other external factors such as September 11 attacks, labeling Iran as “axis of evil” by George...
    Get full text
    Thesis
  2. 102
    by Abu Bakar, Hafizal
    Published 2011
    ... ratio at angle of attack range from 0° - 12° the recorded value is smaller than the published data due...
    Get full text
    Thesis
  3. 103
    by Ayad, Mustafa Abdsalam
    Published 2002
    ... to authenticate a client, depending on the smart card usage. The major attacks that affect the smart card...
    Get full text
    Thesis
  4. 104
    by Salih, Moslih Amer
    Published 2015
    ... by exposing the mortar to extreme environments, namely elevated temperatures and sulfate attack...
    Get full text
    Thesis
  5. 105
    by Sulong, Mek Rahmah
    Published 2008
    ...) test for any Subkeys. These contribute to some attacks in the Key Schedule. Thus, a new transformation...
    Get full text
    Thesis
  6. 106
    by Lim, Jefferey Seng Heng
    Published 2013
    ... to attacks by few diseases such as anthracnose and Chili Mozaic Virus (CMV). Anthracnose is being considered...
    Get full text
    Thesis
  7. 107
    by Marjani, Mohammad Ebrahim
    Published 2013
    ... (karate player) to avoid the opponent’s attacks, and to assume optimal position for efficient performance...
    Get full text
    Thesis
  8. 108
    by Morufu, Olalere
    Published 2016
    ... lost mobile device of an employee, by shoulder surfing password attacks and password guessing attacks...
    Get full text
    Thesis
  9. 109
    by Olufemi, Osaji Emmanuel
    Published 2020
    ... protection scheme design. The high-cost of implementations, cyber-attack, and latency concerns from...
    Get full text
    Thesis
  10. 110
    by Ahmad, Mohd Najib
    Published 2020
    ... attack of 10%-50% leaf damage may cause 43% yield loss. The population of bagworms if not controlled...
    Get full text
    Thesis
  11. 111
    by Rashid, Mustafa Noori
    Published 2018
    ... to attackers and the cloud provider. By applying the proxy signature technique, the group leader can...
    Get full text
    Thesis
  12. 112
    by Wong, Sin Yeng
    Published 2001
    ... mPa.s) and were susceptible to biological attack after two days at ambient. The incorporation...
    Get full text
    Thesis
  13. 113
    by Osman, Noorzaliza
    Published 2008
    ... divided into playing position (defence, attack and centre) and team performance (high and low). A body fat...
    Get full text
    Thesis
  14. 114
    by Abu, Ahmad Zaidee
    Published 2008
    ... of Distorted DC permutation (DDP), it was considered to be having medium security based on some basic attack...
    Get full text
    Thesis
  15. 115
    by Mohammad Salehi, .
    Published 2019
    .... Consequently, Android is the main target of attackers on mobile and portable devices. In order to protect users...
    Get full text
    Thesis
  16. 116
    by Mahad, Zahari
    Published 2014
    ... features available on AAβ cryptosystem to avoid being attacked by enemies. Finally, we amend the Rabin...
    Get full text
    Thesis
  17. 117
    by M. Balakrishnan, M. B. Usha
    Published 2002
    ... of this utopianism. Dostoevsky's characterization is perhaps an attack on the degeneration of man and the values...
    Get full text
    Thesis
  18. 118
    ... side channel attack (SCA). The first objective of this thesis is to introduce a new scalar recoding...
    Get full text
    Thesis
  19. 119
    by Mohd Pilus, Mohd Nordin
    Published 2007
    ...In recent years there is an increasing incidence of bomb attacks on civil engineering structures...
    Get full text
    Thesis
  20. 120
    by Loo, Rebecca Ting Jiin
    Published 2016
    ... into the real data such as kidney catheter data, Worcester Heart Attack study and also Stanford Heart...
    Get full text
    Thesis