Showing 361 - 380 results of 1,198 for search '"Attacker"', query time: 0.04s Refine Results
  1. 361
    by Dabiranzohouri, Miranda
    Published 2014
    ... on their computers. The expressiveness of the PDF format, furthermore, enables attackers to evade detection...
    Thesis
  2. 362
    ... and the basic concept of how PGP works and its key components. We also will look into the possible attack...
    Get full text
    Thesis
  3. 363
    by Mohamed Ahmed, Osman
    Published 1997
    ..., when the airplane flies at low speeds and small angles of attacks, the lift provided by single...
    Get full text
    Thesis
  4. 364
    by Salleh, Muhammad Taufiq
    Published 2016
    ... against the radical attack during direct methanol fuel cell (DMFC) operation was elucidated by the Fenton...
    Get full text
    Thesis
  5. 365
    by Mushtaq, Muhammad Faheem
    Published 2019
    ... cubes are not sufficient to resist attacks and could easily be exploited. Therefore, the large key space...
    Get full text
    Get full text
    Get full text
    Thesis
  6. 366
    by Hassan Disina, Abdulkadir
    Published 2018
    ... attack. Similarly, the key space should be disproportionately large to resist any attack on the secret...
    Get full text
    Get full text
    Get full text
    Thesis
  7. 367
  8. 368
    by Jamil, Norziana
    Published 2013
    ... weight as compared to the existing formula of message expansion. This leads the effort of attackers...
    Get full text
    Thesis
  9. 369
  10. 370
  11. 371
    by Mohd Tamil, Emran
    Published 2004
    ... of 19120 attack alert generated by snort. One of the honeypot deployed has been abused as an IRC bot server...
    Get full text
    Thesis
  12. 372
    by Kasno,
    Published 1982
    ...) ,merupakan serangga yang terpilih untuk dikaji lebih lanjut. A search for arthropods attacking water...
    Get full text
    Thesis
  13. 373
    by Abdulqawi, Ala Abdulrahman
    Published 2013
    ... customer information. Malware attacks, phishing fraudsters and other types of attacks have become well...
    Get full text
    Thesis
  14. 374
    ...Insider attack is formsthe biggest threat against database management systems. Although many...
    Get full text
    Thesis
  15. 375
    by Ahmad, Nordila
    Published 2015
    ... rectangular pier was chosen for inclusion in an experiment on skewed piers at various angles of attack...
    Get full text
    Thesis
  16. 376
    by Hashim, Mohammed Mahdi
    Published 2022
    ... to the intruders. Nevertheless, any steganography system launched over the internet can be attacked upon...
    Get full text
    Thesis
  17. 377
    by Ibrahim, Nurudeen Mahmud
    Published 2019
    ... the issue of poor detection accuracy due to insignificant features and coordinated attacks...
    Get full text
    Thesis
  18. 378
  19. 379
    by Lee, Weng Wah
    Published 2002
    ...Soil salinity and attack by pathogen a re the major abiotic stresses in plant agriculture...
    Get full text
    Thesis
  20. 380
    by Chang, Yu Cheng
    Published 2004
    ... scheme such that it is vulnerable to some form of attacks. Since Brand’s scheme is the basis of most E...
    Thesis