-
81by Nematollahi, Mohammad Ali“...) and Lifting Wavelet Transform (LWT) with SVD, against different attacks such as filtering, additive noise...”
Published 2015
Get full text
Thesis -
82by Tanha, Maryam“... automatic response and self-healing capabilities to handle multifarious malicious attacks while remaining...”
Published 2013
Get full text
Thesis -
83by Salem Hussin, Saleh Hussin“... message. Image is the watermark channel or carrier. Image pixels and possible attacks on marked image...”
Published 2005
Get full text
Thesis -
84by Franco, Daniel Jose Da Graca Peceguina“... to learn systems’ specifications and extract general state-based rules for attacks identification...”
Published 2021
Get full text
Thesis -
85by Abdul Wahid, Mohammed N.“... transmitted on high speed communications links for errors and attackers’ detection and signal integrity...”
Published 2016
Get full text
Thesis -
86by Mohd Nasir, Rinie Narinie“... (PNS) attack compared to Bennet and Brassard 1984 (BB84) protocol. It is more likely...”
Published 2015
Get full text
Thesis -
87by Che Yusof, Nik Syamsul Bahari“... as the violent and critical attacks by cavitation can cause a lot of damage to ball valves. The damage in term...”
Published 2014
Get full text
Thesis -
88by Liew, Jiun Terng“... card used also raises the concern of resources availability due to selfish attack. Therefore, work...”
Published 2019
Get full text
Thesis -
89by Ariffin, Suriyani“... of differential and linear attacks. There are no three-round linear trails with predictable input-output...”
Published 2012
Get full text
Thesis -
90by Tuan Yusof, Tuan Norizan“...Green leafhopper (GLH), nephotettix virescens is one of the insects that attacks paddy plants...”
Published 2018
Get full text
Thesis -
91by Jamal, Fara“... a security attack. Also, user attributes are stored in the block storage using an InterPlanetary...”
Published 2021
Get full text
Thesis -
92by Asbullah, Muhammad Asyraf“... security goal and the strong attack model, namely the indistinguishability and the chosen-ciphertext attack...”
Published 2015
Get full text
Thesis -
93by Mohamed, Kartini“... and protect the system from several attacks such as brute force and tampering attacks. Therefore, the use...”
Published 2017
Get full text
Thesis -
94by Najafabadi, Seyed Abdolrahman Mousavian“... of the malicious attackers to violate the security and privacy by spreading malicious codes over a wider range...”
Published 2016
Get full text
Thesis -
95by Md Salim, Rafidah“... attacks. Heat treatment is one of the potential treatments to enhance the durability of bamboo...”
Published 2008
Get full text
Thesis -
96by Buhari, Abudhahir“... attacks However, this scheme requires noiseless quantum channel in order to detect the insider...”
Published 2015
Get full text
Thesis -
97by Tuama, Ammar Yaseen“... of an Elliptic Curve equation. In terms of security, the proposed solution is studied against brute-force attacks...”
Published 2016
Get full text
Thesis -
98by Tan, Li Peng“... and Thailand attacking plants form the genus Ocimum, herein its common name, ocimum tingid. Cochlochila bullita...”
Published 2014
Get full text
Thesis -
99by Kojouri, Samira Jilani“..., sulfate attack and drying shrinkage were conducted at late ages up to six months. The SEM, XRD, FTIR, TGA...”
Published 2016
Get full text
Thesis -
100by Lee, Soon Heng“... in controlling termite attacks. Therefore, further studied had been carry out using OPT and Rubberwood...”
Published 2015
Get full text
Thesis