Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
281by Yahaya, Zulkifli“... between the two airfoils. The effects of Reynolds numbers, angles of attack, and airfoil profiles...”
Published 2005
Get full text
Thesis -
282by Parveen, Sajida“... threats, one of them is spoofing attacks. A spoofing attack occurs when a person tries to masquerade...”
Published 2016
Get full text
Thesis -
283by Bakhdlaghi, Yousef Abdullah“... the discovery of large-scale and coordinated attacks. Although existing CIDN offers consultation capability...”
Published 2020
Get full text
Thesis -
284by Dak, Ahmad Yusri“... to being vulnerable to jamming attacks. A study found that eighty one percent of attacks occurs...”
Published 2019
Get full text
Thesis -
285by Soleymani, Seyed Ahmad“... patterns of attacks such as simple attack, opinion tampering attack, and cunning attack. In conclusion...”
Published 2019
Get full text
Thesis -
286by Haratian, Mohammad Hossein“... number of efforts have concentrated on handling the vast variety of security attacks. The characteristic...”
Published 2009
Get full text
Thesis -
287by Mohammad Khamees Khaleel, Alsajri“... that can achieve consistent results when employed for the detection of multiple attack types. Hence...”
Published 2022
Get full text
Thesis -
288by Yaribakht, Amir Hesam“... that can be robust against common image processing attacks such as JPEG compression, rotation, sharpening...”
Published 2020
Get full text
Thesis -
289
-
290by Pang, Kok An“... against side channel cube attack is also presented in this thesis. For most of the secret keys, by reading...”
Published 2021
Get full text
Get full text
Thesis -
291
-
292by Behnia, Armaghan“... period of validity it may compromise through brute force attacks or dictionary attacks. In order to come...”
Published 2013
Get full text
Thesis -
293by Mustafa, Intan Shafinaz“...) open to the potential attacks during transmission. Recipients required a mechanism which can prove...”
Published 2006
Get full text
Thesis -
294by Dhahir, Saif Mahmood“..., dynamic, infrastructure-less and self-organizing, MANETs are vulnerable to several kinds of attacks...”
Published 2017
Get full text
Thesis -
295by Noorlaily Izwana Ibrahim“... to the users. The term “malvertising” comes from the word malware and advertising. It is one type of attack...”
Published 2012
Get full text
Thesis -
296by Sarhan, Ali Raheem“... Reynolds number airfoils were used to design air catchers with three angles of attack and four different...”
Published 2015
Get full text
Get full text
Get full text
Thesis -
297by Ahmad, Miza Mumtaz“... is close to nil. However, it is easier to attack the key generation protocol using less complicated attack...”
Published 2011
Get full text
Thesis -
298by Taqiyah Khadijah, Ghazali“... and privacy. Moreover, this also increases the probability of privacy leakage which lead to attacks...”
Published 2023
Get full text
Get full text
Thesis -
299by Valashani, Pouya Bagherpour“... are studied: attacking cash machine, cashier’s attacking and making the store messy. In implementing...”
Published 2013
Get full text
Thesis -
300by Al-Aswer, Faisal Saleh Nasser“... to OWASP 2013 security report, Cross Site Scripting came in third place. Cross Site Scripting is an attack...”
Published 2017
Get full text
Thesis