Showing 401 - 420 results of 1,221 for search '"Attacker"', query time: 0.04s Refine Results
  1. 401
    by Ong, Janice Aun Nee
    Published 2021
    .... It has also not easily been understood and identified that attacking crop could be due to parasitic...
    Get full text
    Thesis
  2. 402
    by Mohd Rosdi, Muhamad Haziq
    Published 2021
    ... our security will be attacking just the matter of time how long it will take to crash our security...
    Get full text
    Thesis
  3. 403
    by Kamarundzaman, Noor Shana
    Published 2014
    ...This study investigates the effects of using phonics approach on pupils’ word attack and decoding...
    Get full text
    Thesis
  4. 404
    by Josiah, Kekere Temitope
    Published 2015
    ... malicious attacks. Intrusion detection serves as a second line of defense apart from firewall...
    Get full text
    Thesis
  5. 405
    by Sharifara, Ali
    Published 2012
    ... quality and robustness. To evaluate the proposed technique, some attacks have been applied...
    Get full text
    Thesis
  6. 406
    by Ong, Bee Suan
    Published 2000
    ... was most marked in the attack and release portions of the ADSR envelope. The results also showed...
    Get full text
    Thesis
  7. 407
    by Hwang, Siaw San
    Published 2002
    ...Enhanced disease resistance and plant defense response against pathogen attack and environmental...
    Get full text
    Thesis
  8. 408
    by Alfaris, Rand Qusay
    Published 2009
    ... the attack, because every attack requires solving a system of non-linear equations. The decimal cryptosys...
    Get full text
    Thesis
  9. 409
    by Abbas, Borkan Ahmed
    Published 2016
    ... anomaly detection with the proficiency to recognize unforeseen attacks. An IDSs should provide high...
    Get full text
    Thesis
  10. 410
    by Kamarul Aizan, Nur Hanani
    Published 2012
    ... both protocols in 802.11i WLAN environment. The parameters used for this research are with attack...
    Get full text
    Thesis
  11. 411
    by Ng, Lee Ping
    Published 2004
    ... implemented in this project are shown to be sensitive for the attack. Attacks applied in this project...
    Get full text
    Thesis
  12. 412
    ... and robust properties which makes it resistant to different well-known attacks. However, existing hybrid SVD...
    Get full text
    Thesis
  13. 413
    by Abdul Rahman, Qatrunnada
    Published 2017
    ... in such environment are said to be exposed to attacks such as identity impostor, unauthorized access and also man...
    Get full text
    Thesis
  14. 414
    by Mohamed, Nur Nabila
    Published 2015
    ... and simplicity but it provides no security mechanism which makes it vulnerable to various attacks. This work...
    Get full text
    Thesis
  15. 415
    by Umar, Wan Ahmad Syahir Wan
    Published 2019
    .... Regardless of type of buildings, termite can be found attacking some common places in the buildings. Termites...
    Get full text
    Thesis
  16. 416
    by Lim, Say Yarn
    Published 2007
    ... known, watermark information which is embedded in frequency domain is more robust to attacks. Logo...
    Get full text
    Thesis
  17. 417
    by Adnan, Myasar Mundher
    Published 2013
    ... attacks. In this thesis, The RGB colour image watermarking is proposed using by Discrete Slantlet...
    Get full text
    Thesis
  18. 418
    by Ali, Bokan Omar
    Published 2013
    .... It is predominantly used for copyright protection against copyright infringement and malicious attacks. Embedding a...
    Get full text
    Thesis
  19. 419
    by Abunada, Ahmed A. A.
    Published 2013
    ... to detect novel attacks and produces high false alarm. Besides, data labeling is expensive and time...
    Get full text
    Thesis
  20. 420
    by Abdulkadir, Abubakar
    Published 2013
    .... The used of IDS to deter the massively sophisticated attacks in most of our industries, governmental...
    Get full text
    Thesis