Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
721by Abubakar, Saidu Isah“..., k, ks, and zs. Furthermore, this research work develops four successful cryptanalysis attacks...”
Published 2018
Get full text
Thesis -
722by Hoe, Pik Kheng“... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...”
Published 2010
Get full text
Thesis -
723by Hoe, Pik Kheng“... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...”
Published 2010
Get full text
Thesis -
724by Wong, Woon Keong“...-storey feature with open space ground floor. Such building type is highly vulnerable to seismic attack...”
Published 2020
Get full text
Thesis -
725by Rafieizonooz, Mahdi“... exhibited good influence in terms of resistance to chemical attacks than the control specimen. On the other...”
Published 2017
Get full text
Thesis -
726by Brohi, Sarfraz Nawaz“... and integrity concerns. Malicious attackers have violated the cloud storages to steal, view, manipulate...”
Published 2015
Get full text
Thesis -
727by Yusof, Yusnita“... (MDI) technique and information about the identification and control of asthma attacks...”
Published 2006
Get full text
Thesis -
728by Farsidilla Basuki, Febbie“.... Recent increase in terrorist attacks gave governments the momentum to use „war on terror‟ validations...”
Published 2015
Get full text
Thesis -
729by Tey, Sheik Kyin“... of currency crisis and supports the first-generation model of speculative attacks; (5) the responses...”
Published 2018
Get full text
Thesis -
730by Hariri, Azian“... was statically stable with trimmed angle of attack of approximately 0.18 degree. Through mathematical model...”
Published 2009
Get full text
Get full text
Get full text
Thesis -
731by Mahalingam, Sheila“...-malicious attacks. This approach can guide on what can be done to improve learners’ participation...”
Published 2017
Get full text
Get full text
Thesis -
732
-
733
-
734
-
735by Elsharif, Tarig Elsayed Ali“... attacked by the fungus Fusarium oxysporum Schlect. fsp. cubense (E.F.Smith) Snyder and Hansen (FOC...”
Published 2003
Get full text
Thesis -
736by Ab Raub, Rosmawati“... of September 11, 2001 attacks on The World Trade Center in the United States. E-mail traffic, disease...”
Published 2010
Get full text
Thesis -
737by Moh. Usman, Nurhadi“... of survey indicated that CTV was found to attack citrus varieties such as C. grandis, C. aurantifolia, C...”
Published 2002
Get full text
Thesis -
738by Way, Chiang Poh“... response to fungal attack. This response has been hypothesized to play an important role in determining...”
Published 2006
Get full text
Thesis -
739by Lim, Kean Jin“... fungal attack did not involve individual gene. Additionally, many clones encoding proteins with unknown...”
Published 2006
Get full text
Thesis -
740by Abkooh, Elaheh Taheri“... is the sixth most susceptible country in the world to cyber-risks, in the form of malware attacks via computer...”
Published 2016
Get full text
Thesis