-
1by Mohd Jaafar, Fatin Haziqah“...This study is about termite attack at historical building, where it is involves a conservation work...”
Published 2013
Get full text
Thesis -
2by Azali, Muhamad Rizal“...This project is using a honeypot as a tool to detect internal network attack at Faculty...”
Published 2005
Get full text
Thesis -
3by Mohd Fauzi, Shukor Sanim“... of computer viruses, Trojan horses, worms, and other malicious codes. Computer viruses attacks are problems...”
Published 2003
Get full text
Thesis -
4by Md Ilyas, Siti Sarah“...The number of phishing attacks involving online banking has records an increase percentage over...”
Published 2017
Get full text
Thesis -
5by Ahmad, Zaid“.... Unfortunately, the AODV protocol is vulnerable to attacks due to the lack of security. Among various kinds...”
Published 2014
Get full text
Thesis -
6by Ibrahim, Riziana“...The cyber attack is a severe attack that might cause harm especially to the big organization...”
Published 2012
Get full text
Thesis -
7by Mansor, Ahmad Abdul Azim“... attacker techniques and how to defend against them. Little specialized knowledge is required to set up...”
Published 2007
Get full text
Thesis -
8by Baharuddin, Muhamad Syuhaimi“... of the password to be captured through password guessing attacks or brute-force attack. So, to reduce...”
Published 2004
Thesis -
9by Dak, Ahmad Yusri“... to being vulnerable to jamming attacks. A study found that eighty one percent of attacks occurs...”
Published 2019
Get full text
Thesis -
10by Hashim, Md Nazri“...Exploitation by attackers whose have breached the network security of some of the world's most...”
Published 2005
Get full text
Thesis -
11by Ismail, Izaitul Aida“.... Rhinoceros beetle (Oryctes rhinoceros) was a major pest and attacked both type of palma. This pest attacked...”
Published 2021
Get full text
Thesis -
12by Hamid Ali, Firkhan Ali“...Exploitation by attackers whose have breached the network security of some of the world's most...”
Published 2004
Get full text
Thesis -
13by Engliman, Muhammad Ariff“... or passing made towards obtaining field goals or penalty comers won by the attacking team. Longer passing...”
Published 2014
Get full text
Thesis -
14by Wan Ali, Wan Nor Ashiqin“... several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6...”
Published 2015
Get full text
Thesis -
15by Mokhtar, Ridwan“... model and the three-dimensional results. The effects of angles of attack and aerofoil profiles were...”
Published 2006
Get full text
Thesis -
16by Che Wan Idris, Che Wan Zaidie“... will focus on the aerodynamic characteristics at various angles of attack at 0.1 - 0.15 Mach number using...”
Published 2009
Get full text
Thesis -
17by Wan Razali, Wan Mohd Hafizan“... subsonic speed. The study will focus on the aerodynamic characteristics at various angles of attack at 0.1...”
Published 2009
Get full text
Thesis -
18by Mohamed, Nur Nabila“... and simplicity but it provides no security mechanism which makes it vulnerable to various attacks. This work...”
Published 2015
Get full text
Thesis -
19by Abdul Satar, Azwan“... to these networks. A large portion of these treats are in the form of spoof attacks. Spoof attacks involve...”
Published 2007
Get full text
Thesis -
20by Mubarak, Mohd Faizal“... that unprotected RFID platform can be compromised either by malicious codes or man in the middle attack. System...”
Published 2010
Get full text
Thesis