-
61by Daud, Muhamad Azlan“... input. Alvarez through his one-time pad attack successfully attacked the Baptista cyptosystem. Ariffin...”
Published 2014
Get full text
Thesis -
62by Shojanazeri, Hamid“... as watermarks to provide malicious attack classification and locating tampered area. The Zernike moments...”
Published 2013
Get full text
Thesis -
63by Alamjuri, Roziela Hanim“... is non-durable. It is susceptible to fungal and termite attacks. Hence, there is a need to treat bamboo...”
Published 2008
Get full text
Thesis -
64by Alezabi, Kamal Ali Ahmed“... of the existing authentication schemes are complex and vulnerable to network attacks such as User Identity...”
Published 2017
Get full text
Thesis -
65by Adeeb, Jnaidi Saed Maher“...Since the period followed the September 11 in 2001 attack, and the second Palestinian uprising...”
Published 2019
Get full text
Thesis -
66by Ismail, Haqi Khalid“..., and impersonation attacks. Cybercriminals can take advantage of insecure communication to perform attacks that lead...”
Published 2021
Get full text
Thesis -
67by Liew, Seow Wooi“.... Traditionally, phishing attacks target email, but now they have reached to Online Social Networks (OSNs) like...”
Published 2019
Get full text
Thesis -
68by Alkinany, Enas Akeel Raheem“.... However, Spoof attacks remain the main challenge faced by facial biometric systems. A spoof attack arises...”
Published 2019
Get full text
Thesis -
69by Mohamed Ahmed, Osman“..., when the airplane flies at low speeds and small angles of attacks, the lift provided by single...”
Published 1997
Get full text
Thesis -
70by Jamil, Norziana“... weight as compared to the existing formula of message expansion. This leads the effort of attackers...”
Published 2013
Get full text
Thesis -
71by Ahmad, Nordila“... rectangular pier was chosen for inclusion in an experiment on skewed piers at various angles of attack...”
Published 2015
Get full text
Thesis -
72by Lee, Weng Wah“...Soil salinity and attack by pathogen a re the major abiotic stresses in plant agriculture...”
Published 2002
Get full text
Thesis -
73by Roslan, Nuur Alifah“... that will also not raise suspicion when written. Besides that, other concerns are active attacks by intruders...”
Published 2018
Get full text
Thesis -
74by Hwang, Siaw San“...Enhanced disease resistance and plant defense response against pathogen attack and environmental...”
Published 2002
Get full text
Thesis -
75by Tea, Boon Chian“... unauthorized and cheating parties, which either passively or actively attack the scheme. Recently...”
Published 2014
Get full text
Thesis -
76by Ong, Bee Suan“... was most marked in the attack and release portions of the ADSR envelope. The results also showed...”
Published 2000
Get full text
Thesis -
77by Alfaris, Rand Qusay“... the attack, because every attack requires solving a system of non-linear equations. The decimal cryptosys...”
Published 2009
Get full text
Thesis -
78by Abbas, Borkan Ahmed“... anomaly detection with the proficiency to recognize unforeseen attacks. An IDSs should provide high...”
Published 2016
Get full text
Thesis -
79by Kamarul Aizan, Nur Hanani“... both protocols in 802.11i WLAN environment. The parameters used for this research are with attack...”
Published 2012
Get full text
Thesis -
80by Saeed, Auday H.“... the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking...”
Published 2015
Get full text
Thesis