Showing 741 - 760 results of 933 for search '"Attacker"', query time: 0.05s Refine Results
  1. 741
    by Howida AbuBaker, Al-Kaaf
    Published 2022
    ... by attackers to threaten user privacy. Consequently, exploring the patterns of those permissions becomes...
    Get full text
    Thesis
  2. 742
    by Anwar, Raja Waseem
    Published 2022
    ... and inclusion of malicious node led to internal network attacks hence providing the reliable delivery of data...
    Get full text
    Thesis
  3. 743
    by Taha, Mustafa Sabah
    Published 2020
    ... against the statistical, X2 , Histogram and non-structural steganalysis detection attacks. The obtained...
    Get full text
    Thesis
  4. 744
    by Abrahim, Araz Rajab
    Published 2019
    ... the impact of blurring shallow depth, homogenous area, and noise attacks to improve the accuracy. Therefore...
    Get full text
    Thesis
  5. 745
    by Sharfah Ratibah, Tuan Mat
    Published 2022
    ..., current technologies indicate that Android malware attackers have find novel ways to avoid detection...
    Get full text
    Thesis
  6. 746
    by Mohd Akhir, Muhammad Fitri
    Published 2019
    ...Recently, El Nino heatwave phenomena has attacked Malaysia and consequently, the water level...
    Get full text
    Thesis
  7. 747
    ... angle of attack operating at 30 m/s and Reynolds number of 4.4x105 are considered. The present study...
    Get full text
    Thesis
  8. 748
    ...), Yasmina Khadra’s The Attack (2007), Thomas Lee Howell’s Martyr (2015), and Gabriella Ambrosio’s...
    Get full text
    Thesis
  9. 749
    ... losses, including drought conditions or susceptibility to pest and pathogen attacks. The steady...
    Get full text
    Thesis
  10. 750
    by Mohamad Yatim, Jamaludin
    Published 2002
    ... months exposure due to fungal attack. Surface roughness and discoloration on the top surface...
    Get full text
    Thesis
  11. 751
    by Muhasin, Haifaa Jassim
    Published 2019
    ..., management and internal attacks. These issues have become a major challenge in using the cloud, especially...
    Get full text
    Thesis
  12. 752
    by Abbasabadi, Reza Hassanzadeh
    Published 2015
    ... at different angles of attack. Parametric study was conducted in six subsections, in which the modified turbine...
    Get full text
    Thesis
  13. 753
    by Asadi, Ali
    Published 2016
    ... to attacks due to the mobility of nodes and wireless nature of their communications. These applications...
    Get full text
    Thesis
  14. 754
    by Firas (M.H.) S., Najjar
    Published 2016
    ... (NDP) incidents, vulnerabilities, and attacks to support organizational risk management decisions...
    Get full text
    Thesis
  15. 755
  16. 756
  17. 757
  18. 758
  19. 759
    by Rogers, Roy Anthony
    Published 2012
    Get full text
    Thesis
  20. 760
    by Bennett, Donald G.
    Published 2017
    Get full text
    Thesis