-
1by Chai, Jee Sing“.... Generally, the schemes in spatial domain are usually less robust to attacks; while the schemes in frequency...”
Published 2008
Get full text
Thesis -
2by Kuhanraj, Balan“... serious network threats such as denial of service attack, data modification attack, impersonation attack...”
Published 2020
Get full text
Thesis -
3
-
4by Yasir, Javed“...). Formal and computational analysis of TLwS shows that it can mitigate replay attack, Man-in-the-Middle...”
Published 2020
Get full text
Thesis -
5“... of protocol. The formal analysis of LEMAP proves that it can mitigate replay attack, Man-in-the-Middle (MITM...”
Get full text
Thesis -
6by Engkamat, Anak Lading“... hand, the aims of the Human-Crocodile Conflict analysis are to identify factors associated with attacks...”
Published 2020
Get full text
Thesis -
7by Ronnie, Ranjit Singh“...The attacks of 9/11 have marked a significant event not only to the US but to the rest of the world...”
Published 2015
Get full text
Thesis -
8by Elfera, Polly“... of Kapur bukit attacked by insect pest. The common leaf damages on Engkabang jantong tree was ‘hole damage...”
Published 2016
Get full text
Thesis -
9by NURFARAHIN, AJLAN“... (Symington) Kosterm, towards fungal decay and termite attack with and without extractives content, (ii...”
Published 2022
Get full text
Thesis -
10by Choo, Jeffrey Soon Fatt“...Phishing attack is a cybercrime which will result in severe financial losses to consumers...”
Published 2015
Get full text
Thesis -
11
-
12by Iyus, Yosep“... (46.7%) of nurses reported being verbally abuse, 29.2% claimed to be physically attacked, and 24.2...”
Published 2021
Get full text
Get full text
Thesis -
13by Nabila, Satibi“....). Various diseases attacked this black pepper but most common disease is root rot caused by Phytophthora...”
Published 2014
Get full text
Thesis -
14by Chanderan, Navein“... of malware are just not enough to combat modern malware attack as it has inherent limitation...”
Published 2019
Get full text
Thesis -
15by Tan, Colin Choon Lin“... highly confidential credentials are requested. To safeguard Internet users against phishing attacks, a...”
Published 2015
Get full text
Get full text
Thesis -
16by Chang, Ee Hung“... attacks, a hybrid phishing detection method has been proposed. The proposed method utilises logo image...”
Published 2019
Get full text
Thesis -
17by Tan, Colin Choon Lin“... phishing attacks. Mainstream solutions and technical approaches for phishing detection suffer from inherent...”
Published 2021
Get full text
Thesis -
18by Faiezah, Abdullah.“... attacked by any biological degradation agents such as fungi, insects and marine borers. There are several...”
Published 2009
Get full text
Thesis -
19by Jamil, Matarul“... attack problem on reinforced concrete (RC) structures settled under XS3 class exposure by utilising fly...”
Published 2023
Get full text
Get full text
Get full text
Thesis -
20by Siti Zuriani, binti Ismail“... for Sarawak. B. dorsalis complex were also commonly found to attack most of the sampled fruit trees including...”
Published 2014
Get full text
Thesis