Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
461by Kadhim, Karrar Abdul Ameer“..., six types of attacks are applied on watermarked image namely, Gaussian noise, Salt & Pepper Noise...”
Published 2013
Get full text
Thesis -
462by Soltanmohammadi, Saeed“... records. Accessing HIS data through the internet make it more vulnerable to data lost, misuses and attacks...”
Published 2013
Get full text
Thesis -
463by Norlaila Razali“... in the attacking position showed improvement of 4 jumps compared to other playing positions. The 10 Meter Shuttle...”
Published 2011
Get full text
thesis -
464
-
465by Go, Bok Min“... to exploit their special properties/weaknesses to attack public-key-based security protocols....”
Published 2006
Thesis -
466by Ahmad, Aini“...DDos - is a volumetric attack that comes from multiple sources toward a targeted object (website...”
Published 2017
Get full text
Thesis -
467by Muhamad Affandi, Ismail“... at workplace. Types of bullying on this study are personal attack,physical threats, work-related...”
Published 2009
Get full text
Get full text
Thesis -
468by Abdul Wahid, Mohammed N.“... transmitted on high speed communications links for errors and attackers’ detection and signal integrity...”
Published 2016
Get full text
Thesis -
469by NURFARAHIN, AJLAN“... (Symington) Kosterm, towards fungal decay and termite attack with and without extractives content, (ii...”
Published 2022
Get full text
Thesis -
470by Mohd Nasir, Rinie Narinie“... (PNS) attack compared to Bennet and Brassard 1984 (BB84) protocol. It is more likely...”
Published 2015
Get full text
Thesis -
471by Che Yusof, Nik Syamsul Bahari“... as the violent and critical attacks by cavitation can cause a lot of damage to ball valves. The damage in term...”
Published 2014
Get full text
Thesis -
472by Choo, Jeffrey Soon Fatt“...Phishing attack is a cybercrime which will result in severe financial losses to consumers...”
Published 2015
Get full text
Thesis -
473by Irfan Abu Hassan, Nur Muhammad“... occurred in the system such as Distributed Denial of Services’ (DDoS) attack which possess difficulty when...”
Published 2020
Get full text
Thesis -
474by Abdul Satar, Azwan“... to these networks. A large portion of these treats are in the form of spoof attacks. Spoof attacks involve...”
Published 2007
Get full text
Thesis -
475by Liew, Jiun Terng“... card used also raises the concern of resources availability due to selfish attack. Therefore, work...”
Published 2019
Get full text
Thesis -
476by Erica Dina, Erica Dina“... of reinforcement corrosion are carbonation and chloride ions attack. Acid and sulphate attack can also weaken...”
Published 2006
Get full text
Thesis -
477by Balakrishnan, Balamohan“... better resistance to destructive chemical penetration and attacks such as chloride, acid and sulphate...”
Published 2014
Get full text
Thesis -
478by Muhamad, Rafidah“... challenges in detecting tampered region with the presence of all these post-processing attacks in a copy-move...”
Published 2020
Get full text
Thesis -
479by Mohammed Shaamala, Abduljabbar Hasan“... sure the embedding watermark is undetectable by the human eye, robust against common attack...”
Published 2014
Get full text
Thesis -
480by Samian, Normalia“... on, the nodes operate in promiscuous mode and are vulnerable to attacks and service disruption especially from...”
Published 2010
Get full text
Thesis