Showing 21 - 40 results of 148 for search '"Attacker"', query time: 0.05s Refine Results
  1. 21
  2. 22
    by Elebe, Talib Muhsen
    Published 2017
    ... to the increase of natural disasters, armed conflicts or terrorist attacks. It presents great challenges...
    Get full text
    Get full text
    Thesis
  3. 23
  4. 24
    by Muhamad Affandi, Ismail
    Published 2009
    ... at workplace. Types of bullying on this study are personal attack,physical threats, work-related...
    Get full text
    Get full text
    Thesis
  5. 25
    by Badawi, Ashraf Lotfi Elsayed
    Published 2011
    ... major international crisis namely the Luxor terrorist attack, Iraq war, and September 11. The analysis...
    Get full text
    Get full text
    Thesis
  6. 26
    by Awawda, Sabreen
    Published 2020
    ... of Islamicjerusalem, obtained statistics that document Israeli occupation attacks on the educational system...
    Get full text
    Get full text
    Get full text
    Thesis
  7. 27
    by Fara, Jamal
    Published 2006
    ... on their network to run the business. Computer threats such as virus, worms and attack like DDOS, hackers emerge...
    Get full text
    Get full text
    Thesis
  8. 28
    by Norkhushaini, Awang
    Published 2004
    ... operating systems. Two computers have been connected to stimulate the attacking scenario such as in computer...
    Get full text
    Get full text
    Thesis
  9. 29
    by Shaban, Abdullah Ibrahim
    Published 2017
    ...Text-based passwords for authentication are exposed to the dictionary attack as users tend...
    Get full text
    Get full text
    Thesis
  10. 30
    by Aribake, Fadare Olusolade
    Published 2023
    ... to Phishing Attacks (PA) regardless of its availability. However, PA continues to harm IB users and banking...
    Get full text
    Get full text
    Get full text
    Thesis
  11. 31
    ... malicious attacks over the Internet[l]. Snort is a lightweight intrusion detection system that can log...
    Get full text
    Get full text
    Thesis
  12. 32
    by Munirah, Mohd. Yusof
    Published 2002
    ... attack. The medical knowledge is store in the knowledge base in the form of production rules (IFITHEN...
    Get full text
    Get full text
    Thesis
  13. 33
    by Al-Mohammed, Wael Hasan Ali
    Published 2015
    ... of attacks on important information over the network systems is increasing with every year. Intrusion...
    Get full text
    Get full text
    Thesis
  14. 34
    by Ibrahim, Yusof
    Published 2002
    ...-called insider attackers; a dangerous but sometimes neglected security threat. It also explores...
    Get full text
    Get full text
    Thesis
  15. 35
    by Mohd Yassir, Hamzah
    Published 2010
    ... on Americans. After the tragedy, misperception on Islam start to raise, Islam was blamed for the attack...
    Get full text
    Thesis
  16. 36
  17. 37
    by Mohammad Taufik, Saidina Omar
    Published 2010
    ... are using the network to launch the attack silently. A study has been done in Universiti Malaysia Perlis...
    Get full text
    Get full text
    Thesis
  18. 38
    by A. Raof, Rafikha Aliana
    Published 2003
    ... as well as diagnosing heart attack based on early symptons. Since fuzzy logic can be used for prediction...
    Get full text
    Get full text
    Thesis
  19. 39
    by Nor ' Aqilah, Ghazally
    Published 2021
    ... to internet banking. The challenges and resistance that need to be faced by the banking sector are like attack...
    Get full text
    Get full text
    Thesis
  20. 40
    by Utama, Sunariya
    Published 2017
    ... is easily discoverable by attackers. Literature indicated that this issue is probably rooted from the lack...
    Get full text
    Get full text
    Thesis