Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
301by Ong, Elaine Ei Ling“... and SHA1 family algorithm can be break by the generic attacks such as Brute Force attack, domain extender...”
Published 2021
Get full text
Thesis -
302by Wan Ali, Wan Nor Ashiqin“... several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6...”
Published 2015
Get full text
Thesis -
303by Choong, Kai Bin“...”. Text-based CAPTCHA is the most common technique used across the internet to detect bot from attacking...”
Published 2018
Get full text
Thesis -
304by Ahmad Zahari, Nurul Huda“... based on times and attacks. If there is no attack or intrusion detected, MPM will wait...”
Published 2011
Get full text
Get full text
Get full text
Thesis -
305by Noor Zuraidin, Mohd Safar“... anomalies are identified, abnormal DNS packet request, the NetBIOS attack, abnormal DNS MX query, DNS...”
Published 2011
Get full text
Get full text
Thesis -
306by Mokhtar, Ridwan“... model and the three-dimensional results. The effects of angles of attack and aerofoil profiles were...”
Published 2006
Get full text
Thesis -
307“... of protocol. The formal analysis of LEMAP proves that it can mitigate replay attack, Man-in-the-Middle (MITM...”
Get full text
Thesis -
308by Mahmoud Al-Emari, Salam Radi“... to light due to the existing attacks that targeted Ethereum, for instance, the Ethereum DAO attack...”
Published 2022
Get full text
Thesis -
309by Che Wan Idris, Che Wan Zaidie“... will focus on the aerodynamic characteristics at various angles of attack at 0.1 - 0.15 Mach number using...”
Published 2009
Get full text
Thesis -
310by Harun, Hilmi“... and the basic concept of how PGP works and its key components. We also will look into the possible attack...”
Get full text
Thesis -
311by Mohamed Ahmed, Osman“..., when the airplane flies at low speeds and small angles of attacks, the lift provided by single...”
Published 1997
Get full text
Thesis -
312by Salleh, Muhammad Taufiq“... against the radical attack during direct methanol fuel cell (DMFC) operation was elucidated by the Fenton...”
Published 2016
Get full text
Thesis -
313by Mushtaq, Muhammad Faheem“... cubes are not sufficient to resist attacks and could easily be exploited. Therefore, the large key space...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
314by Hassan Disina, Abdulkadir“... attack. Similarly, the key space should be disproportionately large to resist any attack on the secret...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
315
-
316by Jamil, Norziana“... weight as compared to the existing formula of message expansion. This leads the effort of attackers...”
Published 2013
Get full text
Thesis -
317by Engkamat, Anak Lading“... hand, the aims of the Human-Crocodile Conflict analysis are to identify factors associated with attacks...”
Published 2020
Get full text
Thesis -
318by Wan Razali, Wan Mohd Hafizan“... subsonic speed. The study will focus on the aerodynamic characteristics at various angles of attack at 0.1...”
Published 2009
Get full text
Thesis -
319by Mohd Tamil, Emran“... of 19120 attack alert generated by snort. One of the honeypot deployed has been abused as an IRC bot server...”
Published 2004
Get full text
Thesis -
320by Kasno,“...) ,merupakan serangga yang terpilih untuk dikaji lebih lanjut. A search for arthropods attacking water...”
Published 1982
Get full text
Thesis