-
21by Khor, Jing Huey“... attacks is proposed as a prevention mechanism. The proposed protocol is designed with lightweight...”
Published 2013
Get full text
Thesis -
22by Melhim, Loai Kayed Hassan Bani“... the Internet. This has shifted the focus of cyber attackers from curiosity to financial gain. Attackers use...”
Published 2012
Get full text
Thesis -
23by Awadallah, Ruba N S“... attack (IND-CCA2) because of their malleable nature. Moreover, the client (data owner) cannot prove...”
Published 2022
Get full text
Thesis -
24by Al-Saedi, Karim Hashim Kraidi“... of the threat they pose. Therefore, it is difficult for the security analyst to identify attacks and take...”
Published 2013
Get full text
Thesis -
25by Khairunnisa, Khairunnisa“...Primary school children who develop asthmatic attack during school hours required assistance from...”
Published 2012
Get full text
Thesis -
26by Yaacob, Che Mohd Aziz“... sehingga sukar dibendung. On January 4, 2004, an unidentified group attacked a military camp...”
Published 2009
Get full text
Thesis -
27by Omolara, Abiodun Esther“... scheme to address brute-force attacks specifically in the context of password-based encryption systems...”
Published 2020
Get full text
Thesis -
28by al-Dala'ien, Mu'awya Naser Salam“... sessions efficiently and effectively are needed to solve database loading, passive attacks...”
Published 2011
Get full text
Thesis -
29by Ahmed Ali, Ghassan“...) dengan peneroboh. Increasing of network attacks with sophisticated forms has made the network security...”
Published 2011
Get full text
Thesis -
30by Lee, Kok Onn“... the wood against insect and fungal attack. ...”
Published 2007
Get full text
Thesis -
31by Chua , Tze Ping“... for Thermal Interface Materials (TIM) due to its ease of processing, inert to chemical attack, non-toxic...”
Published 2010
Get full text
Thesis -
32by Zulkarnain, Mohammed“...In the wake of the September 11, 2001 attacks, home-grown terrorism (HGT) emerged with significant...”
Published 2018
Get full text
Thesis -
33by Ribadu, Abubakar Bashir“... the nature of attacks and threats faced by investors in the NE by the BH terrorists. Secondly, this is also...”
Published 2018
Get full text
Thesis -
34by Kadir, Ramlah“... be fatal and one of the leading causes of death and illness in the world. The bacteria typi cally attack...”
Published 2016
Get full text
Thesis -
35by Rasdi, Rasnaizam“... be fatal and one of the leading causes of death and illness in the world. The bacteria typi cally attack...”
Published 2016
Get full text
Thesis -
36by Leau, Yu Beng“...% of attacks in web-based applications. The accuracy of IPS can be improved if the network situation is also...”
Published 2016
Get full text
Thesis -
37by Shareeda, Mahmood Arif Lafta Al“... of an open wireless communication medium where messages are exchanged in the plain text allowing attackers...”
Published 2022
Get full text
Thesis -
38by Ghanem, Waheed Ali Hussein Mohammed“... of neural networks on classifying those features into normal and attack instances. To realize...”
Published 2019
Get full text
Thesis -
39by Ali Hassan, Abdullah Alashw Al“.... There was no history of previous similar attack and no medical illness had been known. Social history revealed that he...”
Published 2008
Get full text
Thesis -
40by Jaafar, Mohd Yazid Mohd“... proved that the proposed protocol can resist known attacks against VoIP communication....”
Published 2013
Get full text
Thesis