-
1by Rahman @ Drahman, Haris Fadzilah Abdul“... building. Amongst the common conservation problems of heritage buildings, salt attack and rising damp...”
Published 2011
Get full text
Thesis -
2by Elejla, Omar E. O.“... in IPv6 native networks. IPv6 is vulnerable to a number of attacks from IPv4, besides new attacks have...”
Published 2018
Get full text
Thesis -
3by Omar, Mohd Nizam“... to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation...”
Published 2011
Get full text
Thesis -
4by Ghaben, Ayman Ibrahim Ali“...This thesis proposes an approach to detect HTTP flooding DDoS attacks on web servers. The proposed...”
Published 2023
Get full text
Thesis -
5by Al-Saleem, Samer Abdulsada Mutlag“...The goal of the thesis is to propose an approach that can detect flash crowd attacks that target...”
Published 2017
Get full text
Thesis -
6by Mosa, Mohammad Rasmi Hassun“... to reconstruct attack intentions and estimate similar attack strategies. The intentions are identified through a...”
Published 2013
Get full text
Thesis -
7by Mohammed Ahmed Saad, Redhwan“..., in which ICMP can be blocked or dropped. ICMPv6 opens the door for attackers to attack IPv6 networks...”
Published 2016
Get full text
Thesis -
8
-
9by Ibrahim Al-Ani, Ahmed Khallel“... aims to prevent a DoS attack during the DAD process by designing a rule-based mechanism. The proposed...”
Published 2020
Get full text
Thesis -
10
-
11by Cheng, Han Pin“... menjanakan banyak sambungan palsu terhadap pelayan tersebut. Naptha attack aims to disrupt TCP service a...”
Published 2008
Get full text
Thesis -
12by Yunanto, Sri“...This thesis attempts to analyze the involvement of militant Islamist groups in terror attacks...”
Published 2013
Get full text
Thesis -
13by Eid, Almazrooie Mishal“...Asymmetric and symmetric cryptography are believed to be secure against any attack using classical...”
Published 2018
Get full text
Thesis -
14by Mohamad Fadli, Zolkipli“...-day attacks, malware avoidance techniques and hybrid malware are highlighted. Furthermore, a common...”
Published 2012
Get full text
Thesis -
15by Chong , Chuong Leong“... power at a rotational speed of 300rpm. Wind turbine is investigated as a function of angle of attack...”
Published 2011
Get full text
Thesis -
16by Ibrahim, Ayman Khallel“... making it vulnerable to various threats, such as rogue DHCPv6 server attack and passive attack. Two well...”
Published 2020
Get full text
Thesis -
17by Kasno,“...) ,merupakan serangga yang terpilih untuk dikaji lebih lanjut. A search for arthropods attacking water...”
Published 1982
Get full text
Thesis -
18by Ng, Lee Ping“... implemented in this project are shown to be sensitive for the attack. Attacks applied in this project...”
Published 2004
Get full text
Thesis -
19by Alshoura, Wafa’hamdan Suleiman“... and robust properties which makes it resistant to different well-known attacks. However, existing hybrid SVD...”
Published 2022
Get full text
Thesis -
20by Umar, Wan Ahmad Syahir Wan“.... Regardless of type of buildings, termite can be found attacking some common places in the buildings. Termites...”
Published 2019
Get full text
Thesis