Showing 21 - 40 results of 44 for search '"Attacker"', query time: 0.04s Refine Results
  1. 21
    by Mohd Zaki, Mohammad Hafizudden
    Published 2018
    ... pitting attack. One way of protecting the aluminium is through coating with less reactive metal...
    Get full text
    Thesis
  2. 22
    by Dul Ngajis, Ele Elyiana
    Published 2007
    ... hurricane that had attack some U.S. country make the researcher come out with the title of disaster recovery...
    Get full text
    Thesis
  3. 23
    by Aziz, Syaidahtul Badriyah
    Published 2015
    ... are motivated by their different background and need. Physical attack, such as node cloning gives...
    Get full text
    Thesis
  4. 24
    by Atefi, Kayvan
    Published 2019
    ..., therefore the results may no longer be applicable and are not reliable within the current attacks. Further...
    Get full text
    Thesis
  5. 25
    by Yahya, Nor Hayati
    Published 2002
    ... and is the result of a destructive attack by chemical or electrochemical reactions with its environment...
    Get full text
    Thesis
  6. 26
    ..., intrusion by means of SYN attack, intrusion by means of 'URG Flag' packets, and intrusion via web Contents...
    Get full text
    Thesis
  7. 27
    by Hambali, Raden Siti Amirah
    Published 2022
    ... acid conversion from epoxidized oleic acid was unsuccessful due to self-attack during the carbonation...
    Get full text
    Thesis
  8. 28
  9. 29
    by Mohamad Taher, Ediwarman
    Published 2013
    ... attack to Shapadu Corporation's ICT infrastructure....
    Get full text
    Thesis
  10. 30
    ..., the expected results are the user will able to control the attack of insects at the same time able to control...
    Get full text
    Thesis
  11. 31
    by Zainuddin, Suraya
    Published 2015
    ... total communication failure. In addition, traffic fragmentation is used in numerous network attacks...
    Get full text
    Thesis
  12. 32
    by Zainal, Zulkarnain
    Published 2007
    ..., is vulnerable to known Internet attacks, while at the same time it introduces new security problems in the VoIP...
    Get full text
    Thesis
  13. 33
    by Mohd Salleh, Mohd Safwan Aiman
    Published 2019
    .... Throughout this research, the expected results are the user will able to control the attack of insects...
    Get full text
    Thesis
  14. 34
    by Mat Ariffin, Nur Adrianna
    Published 2020
    ... attacked by diseases were characterized by a low reflectance probably due to the low chlorophyll content...
    Get full text
    Thesis
  15. 35
  16. 36
    by Zulkifli, Normah Erra
    Published 2022
    ...'s economy had been attacked by the sudden crises, where it literally distracts the banking characteristics...
    Get full text
    Thesis
  17. 37
    by Nasruddin, Haziqah
    Published 2023
    ... instead of vertigo attack; however, exploration on this area rarely been done. This study aimed...
    Get full text
    Thesis
  18. 38
    by Suboh, Siti Fatimah
    Published 2023
    ... tested human pathogens is by attacking the cell wall and membrane of bacterial and fungal cells...
    Get full text
    Thesis
  19. 39
    by Nik Omar, Nik Azmi
    Published 2006
    ... of MyKad. This thesis therefore proposed a new MyKad Testing Strategy model for logical attacks...
    Get full text
    Thesis
  20. 40
    by Saiful Annur, Muhamad Safiq
    Published 2013
    ...= -5.394,/? < 0.05), attackers (Z= -3,280, p < 0.05) and also the midfielders (Z= -3.823,p< 0.05...
    Get full text
    Thesis