Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
361by Dabiranzohouri, Miranda“... on their computers. The expressiveness of the PDF format, furthermore, enables attackers to evade detection...”
Published 2014
Thesis -
362by Harun, Hilmi“... and the basic concept of how PGP works and its key components. We also will look into the possible attack...”
Get full text
Thesis -
363by Mohamed Ahmed, Osman“..., when the airplane flies at low speeds and small angles of attacks, the lift provided by single...”
Published 1997
Get full text
Thesis -
364by Salleh, Muhammad Taufiq“... against the radical attack during direct methanol fuel cell (DMFC) operation was elucidated by the Fenton...”
Published 2016
Get full text
Thesis -
365by Mushtaq, Muhammad Faheem“... cubes are not sufficient to resist attacks and could easily be exploited. Therefore, the large key space...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
366by Hassan Disina, Abdulkadir“... attack. Similarly, the key space should be disproportionately large to resist any attack on the secret...”
Published 2018
Get full text
Get full text
Get full text
Thesis -
367
-
368by Jamil, Norziana“... weight as compared to the existing formula of message expansion. This leads the effort of attackers...”
Published 2013
Get full text
Thesis -
369by Engkamat, Anak Lading“... hand, the aims of the Human-Crocodile Conflict analysis are to identify factors associated with attacks...”
Published 2020
Get full text
Thesis -
370by Wan Razali, Wan Mohd Hafizan“... subsonic speed. The study will focus on the aerodynamic characteristics at various angles of attack at 0.1...”
Published 2009
Get full text
Thesis -
371by Mohd Tamil, Emran“... of 19120 attack alert generated by snort. One of the honeypot deployed has been abused as an IRC bot server...”
Published 2004
Get full text
Thesis -
372by Kasno,“...) ,merupakan serangga yang terpilih untuk dikaji lebih lanjut. A search for arthropods attacking water...”
Published 1982
Get full text
Thesis -
373Investigating the influencing factors and attitude towards online banking using biometric technologyby Abdulqawi, Ala Abdulrahman“... customer information. Malware attacks, phishing fraudsters and other types of attacks have become well...”
Published 2013
Get full text
Thesis -
374by Mohammed Rashad Aldhoqm, Arafat“...Insider attack is formsthe biggest threat against database management systems. Although many...”
Published 2013
Get full text
Thesis -
375by Ahmad, Nordila“... rectangular pier was chosen for inclusion in an experiment on skewed piers at various angles of attack...”
Published 2015
Get full text
Thesis -
376by Hashim, Mohammed Mahdi“... to the intruders. Nevertheless, any steganography system launched over the internet can be attacked upon...”
Published 2022
Get full text
Thesis -
377by Ibrahim, Nurudeen Mahmud“... the issue of poor detection accuracy due to insignificant features and coordinated attacks...”
Published 2019
Get full text
Thesis -
378
-
379by Lee, Weng Wah“...Soil salinity and attack by pathogen a re the major abiotic stresses in plant agriculture...”
Published 2002
Get full text
Thesis -
380by Chang, Yu Cheng“... scheme such that it is vulnerable to some form of attacks. Since Brand’s scheme is the basis of most E...”
Published 2004
Thesis