Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
301by Noorlaily Izwana Ibrahim“... to the users. The term “malvertising” comes from the word malware and advertising. It is one type of attack...”
Published 2012
Get full text
Thesis -
302by Sarhan, Ali Raheem“... Reynolds number airfoils were used to design air catchers with three angles of attack and four different...”
Published 2015
Get full text
Get full text
Get full text
Thesis -
303by Ahmad, Miza Mumtaz“... is close to nil. However, it is easier to attack the key generation protocol using less complicated attack...”
Published 2011
Get full text
Thesis -
304by Taqiyah Khadijah, Ghazali“... and privacy. Moreover, this also increases the probability of privacy leakage which lead to attacks...”
Published 2023
Get full text
Get full text
Thesis -
305by Valashani, Pouya Bagherpour“... are studied: attacking cash machine, cashier’s attacking and making the store messy. In implementing...”
Published 2013
Get full text
Thesis -
306by Al-Aswer, Faisal Saleh Nasser“... to OWASP 2013 security report, Cross Site Scripting came in third place. Cross Site Scripting is an attack...”
Published 2017
Get full text
Thesis -
307by Md. Sirat @ Md. Siraj, Maheyzah“...The evolutions of computer network attacks have urged many organizations to install multiple...”
Published 2013
Get full text
Thesis -
308by Hamood, Sabah Fadhel“... and security against attacks. In this study Fibonacci numbers have been exploited to achieve these goals...”
Published 2013
Get full text
Thesis -
309by Mohd Nor, Mohd Aliff“... of attack with reference to drag and lift coefficient. The aim of this project is to compare the aerodynamic...”
Published 2009
Get full text
Thesis -
310by Hashim, Md Nazri“...Exploitation by attackers whose have breached the network security of some of the world's most...”
Published 2005
Get full text
Thesis -
311by Ismail, Izaitul Aida“.... Rhinoceros beetle (Oryctes rhinoceros) was a major pest and attacked both type of palma. This pest attacked...”
Published 2021
Get full text
Thesis -
312by Mokhtar, Mohd. Zaki“.... The major factor for concrete deterioration is carbonation (85%), chloride attack (9%), sulphate attack (3...”
Published 2006
Get full text
Thesis -
313by Hamid Ali, Firkhan Ali“...Exploitation by attackers whose have breached the network security of some of the world's most...”
Published 2004
Get full text
Thesis -
314by Yap, Wun She“... and thus cannot be regarded as an ideal cipher. We also present the first known cryptanalytic attack against...”
Published 2015
Thesis -
315by Mohamed, Nur Nabila“... lacks of access control mechanism and no protection from Man In The Middle (MITM) attack. The security...”
Published 2019
Get full text
Thesis -
316by Engliman, Muhammad Ariff“... or passing made towards obtaining field goals or penalty comers won by the attacking team. Longer passing...”
Published 2014
Get full text
Thesis -
317by Yaseen, Ahmed Hasani“... the functional strategies (i.e. acclaim, attack, and defence that are based on topics) which are used by both...”
Published 2020
Get full text
Thesis -
318by Lam, Shi Xiang“... diferent types of attack, namely attack based on removal of vertices from the network and attack...”
Published 2013
Get full text
Thesis -
319by Ahmad Ghazali, Lizal Iswady“... result, it is vulnerable to Eavesdropping attack. This leads many works on practical protocol...”
Published 2012
Get full text
Thesis -
320