Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
Computer networks
9
Computer security
8
September 11 Terrorist Attacks, 2001
8
Access control
6
Cryptography
6
Dissertations
6
Dissertations, Academic
6
Influence
6
Islam
6
Terrorism
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Design and construction
2
Digital images
2
Digital techniques
2
Digital watermarking
2
Discourse analysis
2
-
1
-
2
-
3by Chan, Kah Wai“...The concrete structures subject to aggressive environment under sulphate attack is of key...”
Published 2021
Get full text
Thesis -
4by Mohd. Ghazzali, Amalina“...This study of web worms attack on web application can be implemented to enhance the security...”
Published 2008
Get full text
Thesis -
5
-
6
-
7
-
8by Haron, Haliza“... to the attackers. This study will focus on jamming attack and the case study has been done at Kolej Komuniti Masjid...”
Published 2015
Get full text
Get full text
Thesis -
9by Ahmad Baidowi, Zaid Mujaiyid Putra“...Plaintext Recovery Attack is a new attack in security system world. It was discovered lately...”
Published 2010
Get full text
Thesis -
10by Sanaei, Mojtaba Ghanaatpisheh“..., selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One...”
Published 2013
Get full text
Thesis -
11by Khan, Muhammad Murad“... In The Middle can observe key exchange messages and can setup MITM attack between communication. Security...”
Published 2013
Get full text
Thesis -
12
-
13by Alahmadi, Ahmed Mohammed A.“... to achieve these vital features the Bitcoin system should be provably secure against the attacks. Many...”
Published 2018
Get full text
Thesis -
14by Mohd Jaafar, Fatin Haziqah“...This study is about termite attack at historical building, where it is involves a conservation work...”
Published 2013
Get full text
Thesis -
15by Abdelgader, Abdelrahman Abdelgader Altigani“...Static cyphers use static transformations for encryption and decryption. Therefore, the attacker...”
Published 2022
Get full text
Thesis -
16by Apandi, Mohamad Aiman Hanif“...In the wireless network, there is an attack called Wormhole attack that capable in confusing...”
Published 2019
Get full text
Thesis -
17by Mohamad, Nurul Zawiyah“... to keep sensitive and confidential information. Since SQL injection attacks occurred as a new way...”
Published 2008
Get full text
Thesis -
18by Al-Hinai, Salim Mohammed Abdullah“... of more users. Thus, it is vulnerable to a variety of attacks, including denial of service (DoS) which...”
Published 2019
Get full text
Thesis -
19by Rahman @ Drahman, Haris Fadzilah Abdul“... building. Amongst the common conservation problems of heritage buildings, salt attack and rising damp...”
Published 2011
Get full text
Thesis -
20by Al-Saadi, Mustafa Yahya ZakariyaSubjects: “...Denial of service attacks...”
Published 2018
Get full text
Thesis