-
121by Lim, Ann“... number of missions,including reconnaissance and attack roles. Motivation that drives UAVs research...”
Published 2012
Get full text
Thesis -
122by Lee, Nani Yer Fui“... is malware attacks; where some of the antivirus scanner unable to detect metamorphic malware or encrypted...”
Published 2019
Get full text
Thesis -
123by Ahmad, Asma Hana“... struggle of an unfortunate victim due to cruel environment; and finally, Jude the Obscure (1895) attacks...”
Published 2003
Get full text
Thesis -
124by Sowan, Salah Ibrahem“..., addressing both theoretical and practical aspects, and tackling both design and attack problems...”
Published 2003
Get full text
Thesis -
125by H. Belgassem, Seddeq“.... The Science of cryptography provides one means to combat these attacks. These include encryption, decryption...”
Published 2004
Get full text
Thesis -
126by Malallah, Fahad Layth“..., online signature biometric requires the use of template database which is vulnerable to attacks...”
Published 2014
Get full text
Thesis -
127by Abd Aziz, Norazah“... the security goals. Analysis on TLS+MA protocol shows that it is resistant against replay and collusion attacks...”
Published 2014
Get full text
Thesis -
128by Abbas, Nidaa Hasan“... and fragile attacks. The results demonstrated that the performance of the scheme remains at par or only...”
Published 2017
Get full text
Thesis -
129by Ghasempour, Ali“.... These numbers indicate that most of attacks are subjected to Android devices. In addition, most of people...”
Published 2019
Get full text
Thesis -
130by Elsharif, Tarig Elsayed Ali“... attacked by the fungus Fusarium oxysporum Schlect. fsp. cubense (E.F.Smith) Snyder and Hansen (FOC...”
Published 2003
Get full text
Thesis -
131by Moh. Usman, Nurhadi“... of survey indicated that CTV was found to attack citrus varieties such as C. grandis, C. aurantifolia, C...”
Published 2002
Get full text
Thesis -
132by Ab Raub , Rosmawati“... of September 11, 2001 attacks on The World Trade Center in the United States. E-mail traffic, disease...”
Published 2010
Get full text
Thesis -
133by Al-Deen, Ahmed A. Baha'a“... in digital watermarking: robustness against noise and attacks, imperceptibility or invisibility, and capacity...”
Published 2007
Get full text
Thesis -
134by Choo, Thye Foo“..., chemical attack resistance, high hot strength and creep resistance properties. However, economical concerns...”
Published 2012
Get full text
Thesis -
135by Najafzadeh, Mahboubeh“... parameters such as flow intensity, flow depth, sediment size, alignment or angle of attack were kept constant...”
Published 2014
Get full text
Thesis -
136by Mohd Sahalan @ Salam, Maznifah“...’ success. Organizations have been targeted by attackers for the value of their data and information...”
Published 2015
Get full text
Thesis -
137by Ahmed, Asmau Goggo“... in the top five (5) MSN application, in which we categorized the various attacks on network and application...”
Published 2018
Get full text
Thesis -
138by Fejer, Azhar Noori“... attacks and hostility. Feminists saw the book to be greatly offensive towards modern women. The three...”
Published 2015
Get full text
Thesis -
139by Sadat, Shehu“... are the activities Boko Haram insurgency, armed banditry and violence attacks from the insurgent. Furthermore...”
Published 2022
Get full text
Thesis -
140by Yusoff, Maryam Jamielah“... to development of T2D through modification of immune response products dosage that exert attacks on host cell...”
Published 2015
Get full text
Thesis