Showing 721 - 740 results of 951 for search '"Attacker"', query time: 0.05s Refine Results
  1. 721
    by Abubakar, Saidu Isah
    Published 2018
    ..., k, ks, and zs. Furthermore, this research work develops four successful cryptanalysis attacks...
    Get full text
    Thesis
  2. 722
    by Hoe, Pik Kheng
    Published 2010
    ... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...
    Get full text
    Thesis
  3. 723
    by Hoe, Pik Kheng
    Published 2010
    ... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...
    Get full text
    Thesis
  4. 724
    by Wong, Woon Keong
    Published 2020
    ...-storey feature with open space ground floor. Such building type is highly vulnerable to seismic attack...
    Get full text
    Thesis
  5. 725
    by Rafieizonooz, Mahdi
    Published 2017
    ... exhibited good influence in terms of resistance to chemical attacks than the control specimen. On the other...
    Get full text
    Thesis
  6. 726
    by Brohi, Sarfraz Nawaz
    Published 2015
    ... and integrity concerns. Malicious attackers have violated the cloud storages to steal, view, manipulate...
    Get full text
    Thesis
  7. 727
    by Yusof, Yusnita
    Published 2006
    ... (MDI) technique and information about the identification and control of asthma attacks...
    Get full text
    Thesis
  8. 728
    by Farsidilla Basuki, Febbie
    Published 2015
    .... Recent increase in terrorist attacks gave governments the momentum to use „war on terror‟ validations...
    Get full text
    Thesis
  9. 729
    by Tey, Sheik Kyin
    Published 2018
    ... of currency crisis and supports the first-generation model of speculative attacks; (5) the responses...
    Get full text
    Thesis
  10. 730
    by Hariri, Azian
    Published 2009
    ... was statically stable with trimmed angle of attack of approximately 0.18 degree. Through mathematical model...
    Get full text
    Get full text
    Get full text
    Thesis
  11. 731
    by Mahalingam, Sheila
    Published 2017
    ...-malicious attacks. This approach can guide on what can be done to improve learners’ participation...
    Get full text
    Get full text
    Thesis
  12. 732
  13. 733
  14. 734
  15. 735
    by Elsharif, Tarig Elsayed Ali
    Published 2003
    ... attacked by the fungus Fusarium oxysporum Schlect. fsp. cubense (E.F.Smith) Snyder and Hansen (FOC...
    Get full text
    Thesis
  16. 736
    by Ab Raub, Rosmawati
    Published 2010
    ... of September 11, 2001 attacks on The World Trade Center in the United States. E-mail traffic, disease...
    Get full text
    Thesis
  17. 737
    by Moh. Usman, Nurhadi
    Published 2002
    ... of survey indicated that CTV was found to attack citrus varieties such as C. grandis, C. aurantifolia, C...
    Get full text
    Thesis
  18. 738
    by Way, Chiang Poh
    Published 2006
    ... response to fungal attack. This response has been hypothesized to play an important role in determining...
    Get full text
    Thesis
  19. 739
    by Lim, Kean Jin
    Published 2006
    ... fungal attack did not involve individual gene. Additionally, many clones encoding proteins with unknown...
    Get full text
    Thesis
  20. 740
    by Abkooh, Elaheh Taheri
    Published 2016
    ... is the sixth most susceptible country in the world to cyber-risks, in the form of malware attacks via computer...
    Get full text
    Thesis