Showing 381 - 400 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 381
    by Abdulqawi, Ala Abdulrahman
    Published 2013
    ... customer information. Malware attacks, phishing fraudsters and other types of attacks have become well...
    Get full text
    Thesis
  2. 382
    ...Insider attack is formsthe biggest threat against database management systems. Although many...
    Get full text
    Thesis
  3. 383
    by Ahmad, Nordila
    Published 2015
    ... rectangular pier was chosen for inclusion in an experiment on skewed piers at various angles of attack...
    Get full text
    Thesis
  4. 384
    by Hashim, Mohammed Mahdi
    Published 2022
    ... to the intruders. Nevertheless, any steganography system launched over the internet can be attacked upon...
    Get full text
    Thesis
  5. 385
    by Ibrahim, Nurudeen Mahmud
    Published 2019
    ... the issue of poor detection accuracy due to insignificant features and coordinated attacks...
    Get full text
    Thesis
  6. 386
  7. 387
    by Lee, Weng Wah
    Published 2002
    ...Soil salinity and attack by pathogen a re the major abiotic stresses in plant agriculture...
    Get full text
    Thesis
  8. 388
    by Chang, Yu Cheng
    Published 2004
    ... scheme such that it is vulnerable to some form of attacks. Since Brand’s scheme is the basis of most E...
    Thesis
  9. 389
    by Kamarundzaman, Noor Shana
    Published 2014
    ...This study investigates the effects of using phonics approach on pupils’ word attack and decoding...
    Get full text
    Thesis
  10. 390
    by Hussein, Mohamud Sheikh Ali
    Published 2014
    ... to the increasing attacks even in such a new ways of attacks for that reason improving intrusion detection system...
    Thesis
  11. 391
    by Hassan, Reband Jamil
    Published 2014
    ...-square attack. In this study, a new colour image steganography technique is proposed using the LSB...
    Thesis
  12. 392
    by Abiodun, Bakare Mustapha
    Published 2011
    ... wireless network from cyber terrorists attacks. The main objective of this research is to deploy...
    Get full text
    Get full text
    Thesis
  13. 393
  14. 394
    by Roslan, Nuur Alifah
    Published 2018
    ... that will also not raise suspicion when written. Besides that, other concerns are active attacks by intruders...
    Get full text
    Thesis
  15. 395
    by Ullah, Shafi
    Published 2021
    ... security attacks due to operational costs and computational unaffordability. With inefficient performance...
    Get full text
    Thesis
  16. 396
    by Md. Sabtu, Norraisha
    Published 2021
    ... attacked by RPW, and an interview session conducted with the plant biosecurity officer to address objective...
    Get full text
    Thesis
  17. 397
    by Tao, Hai
    Published 2012
    ... to geometric attacks is the most challenge work in traditional digital image watermarking techniques...
    Get full text
    Thesis
  18. 398
    by Tea, Boon Chian
    Published 2014
    ... unauthorized and cheating parties, which either passively or actively attack the scheme. Recently...
    Get full text
    Thesis
  19. 399
    by Ronnie, Ranjit Singh
    Published 2015
    ...The attacks of 9/11 have marked a significant event not only to the US but to the rest of the world...
    Get full text
    Thesis
  20. 400
    by Memon, Ubedullah
    Published 2022
    ...Since the last decade, terrorist attacks on the government primary schools of Pakistan surged rage...
    Get full text
    Thesis