-
21
-
22by Elebe, Talib Muhsen“... to the increase of natural disasters, armed conflicts or terrorist attacks. It presents great challenges...”
Published 2017
Get full text
Get full text
Thesis -
23
-
24by Muhamad Affandi, Ismail“... at workplace. Types of bullying on this study are personal attack,physical threats, work-related...”
Published 2009
Get full text
Get full text
Thesis -
25by Badawi, Ashraf Lotfi Elsayed“... major international crisis namely the Luxor terrorist attack, Iraq war, and September 11. The analysis...”
Published 2011
Get full text
Get full text
Thesis -
26by Awawda, Sabreen“... of Islamicjerusalem, obtained statistics that document Israeli occupation attacks on the educational system...”
Published 2020
Get full text
Get full text
Get full text
Thesis -
27by Fara, Jamal“... on their network to run the business. Computer threats such as virus, worms and attack like DDOS, hackers emerge...”
Published 2006
Get full text
Get full text
Thesis -
28by Norkhushaini, Awang“... operating systems. Two computers have been connected to stimulate the attacking scenario such as in computer...”
Published 2004
Get full text
Get full text
Thesis -
29by Shaban, Abdullah Ibrahim“...Text-based passwords for authentication are exposed to the dictionary attack as users tend...”
Published 2017
Get full text
Get full text
Thesis -
30by Aribake, Fadare Olusolade“... to Phishing Attacks (PA) regardless of its availability. However, PA continues to harm IB users and banking...”
Published 2023
Get full text
Get full text
Get full text
Thesis -
31by Alkhushayni, Suboh Mohammad Shehadah“... malicious attacks over the Internet[l]. Snort is a lightweight intrusion detection system that can log...”
Published 2008
Get full text
Get full text
Thesis -
32by Munirah, Mohd. Yusof“... attack. The medical knowledge is store in the knowledge base in the form of production rules (IFITHEN...”
Published 2002
Get full text
Get full text
Thesis -
33by Al-Mohammed, Wael Hasan Ali“... of attacks on important information over the network systems is increasing with every year. Intrusion...”
Published 2015
Get full text
Get full text
Thesis -
34by Ibrahim, Yusof“...-called insider attackers; a dangerous but sometimes neglected security threat. It also explores...”
Published 2002
Get full text
Get full text
Thesis -
35by Mohd Yassir, Hamzah“... on Americans. After the tragedy, misperception on Islam start to raise, Islam was blamed for the attack...”
Published 2010
Get full text
Thesis -
36
-
37by Mohammad Taufik, Saidina Omar“... are using the network to launch the attack silently. A study has been done in Universiti Malaysia Perlis...”
Published 2010
Get full text
Get full text
Thesis -
38by A. Raof, Rafikha Aliana“... as well as diagnosing heart attack based on early symptons. Since fuzzy logic can be used for prediction...”
Published 2003
Get full text
Get full text
Thesis -
39by Nor ' Aqilah, Ghazally“... to internet banking. The challenges and resistance that need to be faced by the banking sector are like attack...”
Published 2021
Get full text
Get full text
Thesis -
40by Utama, Sunariya“... is easily discoverable by attackers. Literature indicated that this issue is probably rooted from the lack...”
Published 2017
Get full text
Get full text
Thesis