Showing 21 - 40 results of 52 for search '"Attacker"', query time: 0.05s Refine Results
  1. 21
    by Zainuddin, Farah Ayiesya
    Published 2019
    ... of attack α = 15° to α = 18°. These angles of attack are the important phases for airfoil during stall...
    Get full text
    Get full text
    Thesis
  2. 22
    by Hameed, Mustafa Emad
    Published 2022
    ... for high-level security against for various kinds of attacks such as denial-of-service (DoS), Distributed...
    Get full text
    Get full text
    Thesis
  3. 23
    by Rasrastara, Fauzi Adi
    Published 2010
    ... behaviors and to find out the certain parameters, which are usually used by viruses to attack the computer...
    Get full text
    Thesis
  4. 24
    by Fauzi Adi, Rafrastara
    Published 2010
    ... behaviors and to find out the certain parameters, which are usually used by viruses to attack the computer...
    Get full text
    Thesis
  5. 25
  6. 26
    by Najiahtul Syafiqah, Ismail
    Published 2013
    ... diagram of DroidKungFu1 and generate attack pattern of DroidKungFu1. This result will help future...
    Get full text
    Get full text
    Thesis
  7. 27
    by Ibrahim, Mimi Dalina
    Published 2016
    ... used internet widely. However, the number of attack, suspicious event and vulnerabilities in internet...
    Get full text
    Get full text
    Thesis
  8. 28
    by Ismail, Najiahtul Syafiqah
    Published 2022
    ... attack. Therefore, this research aimed to improve permission-based detection by integrating permission...
    Get full text
    Get full text
    Thesis
  9. 29
    by Gan, Eng Hong
    Published 2010
    ..., change the data on the tag, physical damage and denial-of service attacks. Recommendations...
    Get full text
    Get full text
    Thesis
  10. 30
    by Mahalingam, Sheila
    Published 2017
    ...-malicious attacks. This approach can guide on what can be done to improve learners’ participation...
    Get full text
    Get full text
    Thesis
  11. 31
    by Ganasan, Umadewi
    Published 2018
    ... subsequence process tend to attack the gold layer thereby causing tarnishing of its surface and formation...
    Get full text
    Get full text
    Thesis
  12. 32
    by Ab Halim, Azni Haslizan
    Published 2014
    ... behavior due to topology changes, node misbehavior or security attacks in which poses a significant impact...
    Get full text
    Get full text
    Thesis
  13. 33
    by Zainal Abidin, Nur Qamarina
    Published 2015
    ... such as electrical stress, biological attack, and outdoor weathering contamination. Leakage Current (LC) is one...
    Get full text
    Get full text
    Thesis
  14. 34
    by Nozmi, Nor Azrin
    Published 2013
    ... of high strength, low density, ductility, and moderate toughness but often disposed to corrosion attack...
    Get full text
    Get full text
    Thesis
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40