Showing 121 - 140 results of 215 for search '"Attacker"', query time: 0.05s Refine Results
  1. 121
    by Lim, Ann
    Published 2012
    ... number of missions,including reconnaissance and attack roles. Motivation that drives UAVs research...
    Get full text
    Thesis
  2. 122
    by Lee, Nani Yer Fui
    Published 2019
    ... is malware attacks; where some of the antivirus scanner unable to detect metamorphic malware or encrypted...
    Get full text
    Thesis
  3. 123
    by Ahmad, Asma Hana
    Published 2003
    ... struggle of an unfortunate victim due to cruel environment; and finally, Jude the Obscure (1895) attacks...
    Get full text
    Thesis
  4. 124
    by Sowan, Salah Ibrahem
    Published 2003
    ..., addressing both theoretical and practical aspects, and tackling both design and attack problems...
    Get full text
    Thesis
  5. 125
    by H. Belgassem, Seddeq
    Published 2004
    .... The Science of cryptography provides one means to combat these attacks. These include encryption, decryption...
    Get full text
    Thesis
  6. 126
    by Malallah, Fahad Layth
    Published 2014
    ..., online signature biometric requires the use of template database which is vulnerable to attacks...
    Get full text
    Thesis
  7. 127
    by Abd Aziz, Norazah
    Published 2014
    ... the security goals. Analysis on TLS+MA protocol shows that it is resistant against replay and collusion attacks...
    Get full text
    Thesis
  8. 128
  9. 129
    by Ghasempour, Ali
    Published 2019
    .... These numbers indicate that most of attacks are subjected to Android devices. In addition, most of people...
    Get full text
    Thesis
  10. 130
    by Elsharif, Tarig Elsayed Ali
    Published 2003
    ... attacked by the fungus Fusarium oxysporum Schlect. fsp. cubense (E.F.Smith) Snyder and Hansen (FOC...
    Get full text
    Thesis
  11. 131
    by Moh. Usman, Nurhadi
    Published 2002
    ... of survey indicated that CTV was found to attack citrus varieties such as C. grandis, C. aurantifolia, C...
    Get full text
    Thesis
  12. 132
    by Ab Raub , Rosmawati
    Published 2010
    ... of September 11, 2001 attacks on The World Trade Center in the United States. E-mail traffic, disease...
    Get full text
    Thesis
  13. 133
    by Al-Deen, Ahmed A. Baha'a
    Published 2007
    ... in digital watermarking: robustness against noise and attacks, imperceptibility or invisibility, and capacity...
    Get full text
    Thesis
  14. 134
    by Choo, Thye Foo
    Published 2012
    ..., chemical attack resistance, high hot strength and creep resistance properties. However, economical concerns...
    Get full text
    Thesis
  15. 135
    by Najafzadeh, Mahboubeh
    Published 2014
    ... parameters such as flow intensity, flow depth, sediment size, alignment or angle of attack were kept constant...
    Get full text
    Thesis
  16. 136
    by Mohd Sahalan @ Salam, Maznifah
    Published 2015
    ...’ success. Organizations have been targeted by attackers for the value of their data and information...
    Get full text
    Thesis
  17. 137
    by Ahmed, Asmau Goggo
    Published 2018
    ... in the top five (5) MSN application, in which we categorized the various attacks on network and application...
    Get full text
    Thesis
  18. 138
    by Fejer, Azhar Noori
    Published 2015
    ... attacks and hostility. Feminists saw the book to be greatly offensive towards modern women. The three...
    Get full text
    Thesis
  19. 139
    by Sadat, Shehu
    Published 2022
    ... are the activities Boko Haram insurgency, armed banditry and violence attacks from the insurgent. Furthermore...
    Get full text
    Thesis
  20. 140
    by Yusoff, Maryam Jamielah
    Published 2015
    ... to development of T2D through modification of immune response products dosage that exert attacks on host cell...
    Get full text
    Thesis