-
1by Nordin, Norfarina“...The Denial of Service (DoS) attack, especially the Distributed Denial of Service (DDoS) attack, has...”
Published 2020
Get full text
Thesis -
2by Mohamad Fauzi, Noor Shafiqa Fazlien“... of attackers which publicly embarrasses the victim by sharing some personal information of the victim...”
Published 2020
Get full text
Thesis -
3by Daim, Siti Baroroh“... of this research is to analyze chronology of Bukit Kepong Police Station attack using 3D model of Bukit Kepong...”
Published 2019
Get full text
Thesis -
4by Bismi, Nur Syafiqa“... phones used. One acts as a client and a personal computer act as an attacker. Wireshark and packet...”
Published 2020
Get full text
Thesis -
5by Irfan Abu Hassan, Nur Muhammad“... occurred in the system such as Distributed Denial of Services’ (DDoS) attack which possess difficulty when...”
Published 2020
Get full text
Thesis -
6The growth analysis of Harumanis mangoes at Universiti Teknologi MARA, Perlis / Alfi Afzal Mad Yusopby Mad Yusop, Alfi Afzal“...% of the total tree that are estimated to be at risk of the attack and it was found that all the tree situated 15...”
Published 2020
Get full text
Thesis -
7by Mohd Alias, Mohamad Ridzuan“... to shield users browsing activity and encrypts data transmitted over the network to prevent sniffing attack...”
Published 2020
Get full text
Thesis -
8by Md Asri, Nur Syafiqa“... attack in Christchurch, New Zealand were selected as case studies. The data was observed approximately 14...”
Published 2020
Get full text
Thesis -
9by Ab Rahim, Rahmah Mardhiah“... attack or the heart rate is high....”
Published 2020
Get full text
Thesis -
10by Che Humaidi, Siti Nur zulaikha“... than underweight whereby leads too many chronic diseases such as diabetes mellitus and heart attack...”
Published 2018
Get full text
Thesis