-
1by Haron, Haliza“... to the attackers. This study will focus on jamming attack and the case study has been done at Kolej Komuniti Masjid...”
Published 2015
Get full text
Get full text
Thesis -
2by Abdollah, Mohd Faizal“... transaction. They have also become the main mean to attack host. The popularity of intrusion tools and script...”
Published 2009
Get full text
Get full text
Thesis -
3by Mohd Salleh, Nurhashikin“... uses the Internet as their platform to form online communities and launch their attack...”
Published 2018
Get full text
Get full text
Thesis -
4by Salih Ali, Nabeel“... applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique...”
Published 2015
Get full text
Get full text
Thesis -
5by Mohd Foozy, Cik Feresa“... the framework for a single attack detection for Spam has been studied. Phishing has never been studied. Existing...”
Published 2017
Get full text
Get full text
Thesis -
6by Halizah, Saad“... of Android design also become it flaw because it not only attract Android user but also attacker for Android...”
Published 2013
Get full text
Get full text
Thesis -
7by Abdul Mubin, Norzul Masri“.... Mobile device are the main devices that can be manipulates by the attacker towards their victims...”
Published 2017
Get full text
Get full text
Thesis -
8by Hirzan, Alauddin Maulana“... to allow transmission. Attacker from IPv6 network can use this tunneling mechanism to send intrusion...”
Published 2017
Get full text
Get full text
Thesis -
9by Abdullah, Raihana Syahirah“...Botnets is a tool for high-profile cyber-attack. It is a collection of compromised computer...”
Published 2016
Get full text
Get full text
Thesis -
10by Pang, Kok An“... against side channel cube attack is also presented in this thesis. For most of the secret keys, by reading...”
Published 2021
Get full text
Get full text
Thesis -
11
-
12by Abdullah, Ahmad Shafawi“.... It was observed that bio mimetic design generated 50% more lift at 10° angle of attack compare to same profile...”
Published 2019
Get full text
Get full text
Thesis -
13by Jamal, Zalifh“... in 2013 reached 600 million, and has grown rapidly in recent years. Malware can attack a wide variety...”
Published 2017
Get full text
Get full text
Thesis -
14by Suziee, Sukarti“... of corrosion attack has also been discussed on the basis of the morphology and the content properties...”
Published 2013
Get full text
Get full text
Thesis -
15by Mohammad, Nur Ameera Natasha“... their attacks. This is with a view of fact that an email becomes one of the primary targets of an internal...”
Published 2022
Get full text
Get full text
Thesis -
16by Jaber, Mustafa Musa“... that caused cannot stop and prevent the attacks of terrorist. Recently, a prevalent relationship between...”
Published 2016
Get full text
Get full text
Thesis -
17by Abbas, Thamer J.“... that did not prevent the terrorist attacks. Recently, a prevalent relationship between information sharing...”
Published 2017
Get full text
Get full text
Thesis -
18by Zainuddin, Farah Ayiesya“... of attack α = 15° to α = 18°. These angles of attack are the important phases for airfoil during stall...”
Published 2019
Get full text
Get full text
Thesis -
19by Hameed, Mustafa Emad“... for high-level security against for various kinds of attacks such as denial-of-service (DoS), Distributed...”
Published 2022
Get full text
Get full text
Thesis -
20by Najiahtul Syafiqah, Ismail“... diagram of DroidKungFu1 and generate attack pattern of DroidKungFu1. This result will help future...”
Published 2013
Get full text
Get full text
Thesis