Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
381Investigating the influencing factors and attitude towards online banking using biometric technologyby Abdulqawi, Ala Abdulrahman“... customer information. Malware attacks, phishing fraudsters and other types of attacks have become well...”
Published 2013
Get full text
Thesis -
382by Mohammed Rashad Aldhoqm, Arafat“...Insider attack is formsthe biggest threat against database management systems. Although many...”
Published 2013
Get full text
Thesis -
383by Ahmad, Nordila“... rectangular pier was chosen for inclusion in an experiment on skewed piers at various angles of attack...”
Published 2015
Get full text
Thesis -
384by Hashim, Mohammed Mahdi“... to the intruders. Nevertheless, any steganography system launched over the internet can be attacked upon...”
Published 2022
Get full text
Thesis -
385by Ibrahim, Nurudeen Mahmud“... the issue of poor detection accuracy due to insignificant features and coordinated attacks...”
Published 2019
Get full text
Thesis -
386
-
387by Lee, Weng Wah“...Soil salinity and attack by pathogen a re the major abiotic stresses in plant agriculture...”
Published 2002
Get full text
Thesis -
388by Chang, Yu Cheng“... scheme such that it is vulnerable to some form of attacks. Since Brand’s scheme is the basis of most E...”
Published 2004
Thesis -
389by Kamarundzaman, Noor Shana“...This study investigates the effects of using phonics approach on pupils’ word attack and decoding...”
Published 2014
Get full text
Thesis -
390by Hussein, Mohamud Sheikh Ali“... to the increasing attacks even in such a new ways of attacks for that reason improving intrusion detection system...”
Published 2014
Thesis -
391A new colour image steganography using LSB approach with halftoning determination embedding positionby Hassan, Reband Jamil“...-square attack. In this study, a new colour image steganography technique is proposed using the LSB...”
Published 2014
Thesis -
392by Abiodun, Bakare Mustapha“... wireless network from cyber terrorists attacks. The main objective of this research is to deploy...”
Published 2011
Get full text
Get full text
Thesis -
393
-
394by Roslan, Nuur Alifah“... that will also not raise suspicion when written. Besides that, other concerns are active attacks by intruders...”
Published 2018
Get full text
Thesis -
395by Ullah, Shafi“... security attacks due to operational costs and computational unaffordability. With inefficient performance...”
Published 2021
Get full text
Thesis -
396by Md. Sabtu, Norraisha“... attacked by RPW, and an interview session conducted with the plant biosecurity officer to address objective...”
Published 2021
Get full text
Thesis -
397by Tao, Hai“... to geometric attacks is the most challenge work in traditional digital image watermarking techniques...”
Published 2012
Get full text
Thesis -
398by Tea, Boon Chian“... unauthorized and cheating parties, which either passively or actively attack the scheme. Recently...”
Published 2014
Get full text
Thesis -
399by Ronnie, Ranjit Singh“...The attacks of 9/11 have marked a significant event not only to the US but to the rest of the world...”
Published 2015
Get full text
Thesis -
400by Memon, Ubedullah“...Since the last decade, terrorist attacks on the government primary schools of Pakistan surged rage...”
Published 2022
Get full text
Thesis