Showing 21 - 40 results of 44 for search '"Attacker"', query time: 0.06s Refine Results
  1. 21
    by Ibrahim, Mimi Dalina
    Published 2016
    ... used internet widely. However, the number of attack, suspicious event and vulnerabilities in internet...
    Get full text
    Get full text
    Thesis
  2. 22
    by Ismail, Najiahtul Syafiqah
    Published 2022
    ... attack. Therefore, this research aimed to improve permission-based detection by integrating permission...
    Get full text
    Get full text
    Thesis
  3. 23
    by Gan, Eng Hong
    Published 2010
    ..., change the data on the tag, physical damage and denial-of service attacks. Recommendations...
    Get full text
    Get full text
    Thesis
  4. 24
    by Mahalingam, Sheila
    Published 2017
    ...-malicious attacks. This approach can guide on what can be done to improve learners’ participation...
    Get full text
    Get full text
    Thesis
  5. 25
    by Ganasan, Umadewi
    Published 2018
    ... subsequence process tend to attack the gold layer thereby causing tarnishing of its surface and formation...
    Get full text
    Get full text
    Thesis
  6. 26
    by Ab Halim, Azni Haslizan
    Published 2014
    ... behavior due to topology changes, node misbehavior or security attacks in which poses a significant impact...
    Get full text
    Get full text
    Thesis
  7. 27
    by Zainal Abidin, Nur Qamarina
    Published 2015
    ... such as electrical stress, biological attack, and outdoor weathering contamination. Leakage Current (LC) is one...
    Get full text
    Get full text
    Thesis
  8. 28
    by Nozmi, Nor Azrin
    Published 2013
    ... of high strength, low density, ductility, and moderate toughness but often disposed to corrosion attack...
    Get full text
    Get full text
    Thesis
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40