Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
421by Majid, Gelareh“... image, is one of the frequently used techniques. Adding different type of attack such as noise...”
Published 2014
Thesis -
422by Khor, Jing Huey“... attacks is proposed as a prevention mechanism. The proposed protocol is designed with lightweight...”
Published 2013
Get full text
Thesis -
423by Melhim, Loai Kayed Hassan Bani“... the Internet. This has shifted the focus of cyber attackers from curiosity to financial gain. Attackers use...”
Published 2012
Get full text
Thesis -
424by Mohamad, Musfa“... to investigate whether chemical attack in limestone aggregate is the source of problem for sub structure...”
Published 2005
Get full text
Thesis -
425by Yaakub, Mohd Fauzi“... (BET) was applied to scrutinize the lift force and angle of attack distribution along the helicopter...”
Published 2011
Get full text
Thesis -
426by Behna, Rouzbeh“... addressing the private key escrow problem at the same time. Firstly, two attacks are mounted on an efficient...”
Published 2013
Thesis -
427by Oyekola, Ayoola Gabriel“... of the candidate's capacity cum propriety and positive reaction to policy implementation and projection. Attack...”
Published 2023
Get full text
Get full text
Thesis -
428by Chaeikar, Saman Shojae“... for generating, distributing, and finally revoking keys. Many attacks endanger security of key management in each...”
Published 2010
Get full text
Thesis -
429by Saeed, Auday H.“... the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking...”
Published 2015
Get full text
Thesis -
430by Nematollahi, Mohammad Ali“...) and Lifting Wavelet Transform (LWT) with SVD, against different attacks such as filtering, additive noise...”
Published 2015
Get full text
Thesis -
431by Thamer, Khalil Esmeel“.... With the technological advancement, the attackers have been developing new methods from time to time to gain access...”
Published 2020
Get full text
Thesis -
432by Usman, Jamilu“... was studied in terms of resistance to sulfuric acid attack, sulfates attack and at high temperatures...”
Published 2015
Get full text
Thesis -
433
-
434by Tanha, Maryam“... automatic response and self-healing capabilities to handle multifarious malicious attacks while remaining...”
Published 2013
Get full text
Thesis -
435
-
436by Elfera, Polly“... of Kapur bukit attacked by insect pest. The common leaf damages on Engkabang jantong tree was ‘hole damage...”
Published 2016
Get full text
Thesis -
437by Awadallah, Ruba N S“... attack (IND-CCA2) because of their malleable nature. Moreover, the client (data owner) cannot prove...”
Published 2022
Get full text
Thesis -
438by Salem Hussin, Saleh Hussin“... message. Image is the watermark channel or carrier. Image pixels and possible attacks on marked image...”
Published 2005
Get full text
Thesis -
439by Mandala, Satria“..., the nodes become susceptible from several network attacks such as address spoofing, Distributed Denial...”
Published 2005
Get full text
Thesis -
440by Mat Sidek, Abd. Rahim“... to determine their characteristics. The analysis consists; statistical test, correlation attack, linear...”
Published 2006
Get full text
Thesis