Showing 41 - 60 results of 148 for search '"Attacker"', query time: 0.06s Refine Results
  1. 41
  2. 42
    by Rasheed, Mohammad M.
    Published 2012
    ... instead of anomaly-based technology. Signature-based technology can only detect known attacks...
    Get full text
    Get full text
    Thesis
  3. 43
    by Amirulikhsan, Zolkafli
    Published 2008
    ... communication in spreading their ideologies and attack plans by hiding malicious materials in digital images via...
    Get full text
    Get full text
    Thesis
  4. 44
    by Thamarakshan, Shalima
    Published 2015
    ... of bullying are divided into six forms, namely work-related bullying, personal attacks, social isolation...
    Get full text
    Get full text
    Thesis
  5. 45
    by Rosanatrah, Hj. Ramli
    Published 2010
    ... failure) no electrical supply and virus and malicious attacks. Disaster Recovery Planning is becoming a...
    Get full text
    Get full text
    Thesis
  6. 46
    by Norashikin, Baharom
    Published 2019
    ... found that noncompliance behavior compliance is also caused by past pest attack which required the use...
    Get full text
    Get full text
    Get full text
    Thesis
  7. 47
    by Adebola, Babatunde Dorcas
    Published 2014
    ... incidents and social engineering attacks. A questionnaire survey was designed to obtain data on information...
    Get full text
    Get full text
    Thesis
  8. 48
    by Muhamad Saifulbakri, Yusoof
    Published 2021
    ... the terrorist attack in Lahad Datu, the disappearance of MH370, MAF outdated and dysfunctional logistics...
    Get full text
    Get full text
    Get full text
    Thesis
  9. 49
  10. 50
  11. 51
    by Suraya, Wen
    Published 2014
    ..., fight, attack, march, picket, protest, silent protest, hunger strike, sit-in, vigil and dispute...
    Get full text
    Get full text
    Thesis
  12. 52
    by Syed Abdul Haris, Syed Mustapa
    Published 2021
    ... attacks in Lahad Datu Sabah showed the weakness of the national defense system and the ability of the ATM...
    Get full text
    Get full text
    Thesis
  13. 53
    by Md. Nasrudin, Md. Akhir
    Published 2004
    ... disallows for preventive measures or even a counter attack. Although the Japanese Diet itself made a...
    Get full text
    Get full text
    Thesis
  14. 54
  15. 55
  16. 56
  17. 57
  18. 58
  19. 59
  20. 60