-
21by Ibrahim, Mimi Dalina“... used internet widely. However, the number of attack, suspicious event and vulnerabilities in internet...”
Published 2016
Get full text
Get full text
Thesis -
22by Ismail, Najiahtul Syafiqah“... attack. Therefore, this research aimed to improve permission-based detection by integrating permission...”
Published 2022
Get full text
Get full text
Thesis -
23by Gan, Eng Hong“..., change the data on the tag, physical damage and denial-of service attacks. Recommendations...”
Published 2010
Get full text
Get full text
Thesis -
24by Mahalingam, Sheila“...-malicious attacks. This approach can guide on what can be done to improve learners’ participation...”
Published 2017
Get full text
Get full text
Thesis -
25by Ganasan, Umadewi“... subsequence process tend to attack the gold layer thereby causing tarnishing of its surface and formation...”
Published 2018
Get full text
Get full text
Thesis -
26by Ab Halim, Azni Haslizan“... behavior due to topology changes, node misbehavior or security attacks in which poses a significant impact...”
Published 2014
Get full text
Get full text
Thesis -
27by Zainal Abidin, Nur Qamarina“... such as electrical stress, biological attack, and outdoor weathering contamination. Leakage Current (LC) is one...”
Published 2015
Get full text
Get full text
Thesis -
28by Nozmi, Nor Azrin“... of high strength, low density, ductility, and moderate toughness but often disposed to corrosion attack...”
Published 2013
Get full text
Get full text
Thesis -
29
-
30
-
31
-
32
-
33
-
34
-
35
-
36
-
37
-
38
-
39
-
40