Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
401by Ong, Janice Aun Nee“.... It has also not easily been understood and identified that attacking crop could be due to parasitic...”
Published 2021
Get full text
Thesis -
402by Mohd Rosdi, Muhamad Haziq“... our security will be attacking just the matter of time how long it will take to crash our security...”
Published 2021
Get full text
Thesis -
403by Kamarundzaman, Noor Shana“...This study investigates the effects of using phonics approach on pupils’ word attack and decoding...”
Published 2014
Get full text
Thesis -
404by Josiah, Kekere Temitope“... malicious attacks. Intrusion detection serves as a second line of defense apart from firewall...”
Published 2015
Get full text
Thesis -
405by Sharifara, Ali“... quality and robustness. To evaluate the proposed technique, some attacks have been applied...”
Published 2012
Get full text
Thesis -
406by Ong, Bee Suan“... was most marked in the attack and release portions of the ADSR envelope. The results also showed...”
Published 2000
Get full text
Thesis -
407by Hwang, Siaw San“...Enhanced disease resistance and plant defense response against pathogen attack and environmental...”
Published 2002
Get full text
Thesis -
408by Alfaris, Rand Qusay“... the attack, because every attack requires solving a system of non-linear equations. The decimal cryptosys...”
Published 2009
Get full text
Thesis -
409by Abbas, Borkan Ahmed“... anomaly detection with the proficiency to recognize unforeseen attacks. An IDSs should provide high...”
Published 2016
Get full text
Thesis -
410by Kamarul Aizan, Nur Hanani“... both protocols in 802.11i WLAN environment. The parameters used for this research are with attack...”
Published 2012
Get full text
Thesis -
411by Ng, Lee Ping“... implemented in this project are shown to be sensitive for the attack. Attacks applied in this project...”
Published 2004
Get full text
Thesis -
412by Alshoura, Wafa’hamdan Suleiman“... and robust properties which makes it resistant to different well-known attacks. However, existing hybrid SVD...”
Published 2022
Get full text
Thesis -
413by Abdul Rahman, Qatrunnada“... in such environment are said to be exposed to attacks such as identity impostor, unauthorized access and also man...”
Published 2017
Get full text
Thesis -
414by Mohamed, Nur Nabila“... and simplicity but it provides no security mechanism which makes it vulnerable to various attacks. This work...”
Published 2015
Get full text
Thesis -
415by Umar, Wan Ahmad Syahir Wan“.... Regardless of type of buildings, termite can be found attacking some common places in the buildings. Termites...”
Published 2019
Get full text
Thesis -
416by Lim, Say Yarn“... known, watermark information which is embedded in frequency domain is more robust to attacks. Logo...”
Published 2007
Get full text
Thesis -
417Improved watermarking scheme based on best color channel selection using discrete slantlet transformby Adnan, Myasar Mundher“... attacks. In this thesis, The RGB colour image watermarking is proposed using by Discrete Slantlet...”
Published 2013
Get full text
Thesis -
418Colour image watermarking using discrete cosine transform and two-level singular value decompositionby Ali, Bokan Omar“.... It is predominantly used for copyright protection against copyright infringement and malicious attacks. Embedding a...”
Published 2013
Get full text
Thesis -
419by Abunada, Ahmed A. A.“... to detect novel attacks and produces high false alarm. Besides, data labeling is expensive and time...”
Published 2013
Get full text
Thesis -
420by Abdulkadir, Abubakar“.... The used of IDS to deter the massively sophisticated attacks in most of our industries, governmental...”
Published 2013
Get full text
Thesis