Showing 481 - 500 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 481
    by Ali, Mohammed Ahnaf
    Published 2019
    ... that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve...
    Get full text
    Get full text
    Get full text
    Thesis
  2. 482
    by Arman Shah Abdullah
    Published 2015
    ... which act as channels for the aggressive medium to attack the substrate. Duplex and multilayer coatings...
    Get full text
    thesis
  3. 483
    by Badawi, Ashraf Lotfi Elsayed
    Published 2011
    ... major international crisis namely the Luxor terrorist attack, Iraq war, and September 11. The analysis...
    Get full text
    Get full text
    Thesis
  4. 484
    Get full text
    Thesis
  5. 485
    Get full text
    Thesis
  6. 486
    by Awawda, Sabreen
    Published 2020
    ... of Islamicjerusalem, obtained statistics that document Israeli occupation attacks on the educational system...
    Get full text
    Get full text
    Get full text
    Thesis
  7. 487
    by Ahmad, Nazrul Muhaimin
    Published 2018
    ... rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To...
    Get full text
    Get full text
    Thesis
  8. 488
    by Zakaria, Muhammad Shakir
    Published 2022
    ... and situation for the plantation industry especially the pest attack in oil palm contribute to human...
    Get full text
    Thesis
  9. 489
    by Ahmed Ali, Ghassan
    Published 2011
    ... perhatian daripada pihak keselamatan rangkaian. Increasing of network attacks with sophisticated forms...
    Get full text
    Thesis
  10. 490
    by Kai, Chong Zan
    Published 2010
    ...This thesis presents a robust packet drop attack detection protocol (named as Separation...
    Thesis
  11. 491
    by Ariffin, Suriyani
    Published 2012
    ... of differential and linear attacks. There are no three-round linear trails with predictable input-output...
    Get full text
    Thesis
  12. 492
  13. 493
  14. 494
    ...Recent security attacks have breached some of the most secure networks around the world causing...
    Get full text
    Thesis
  15. 495
    by Ashraf, Muhammad Waqar
    Published 2019
    ... transmission. Natural disasters and physical attacks showed significant impacts on the optical networks...
    Get full text
    Thesis
  16. 496
    by Noor Suhana, Sulaiman
    Published 2019
    ... systems and networks by looking for signatures of known attacks or deviations of normal activity. However...
    Get full text
    Thesis
  17. 497
    by Nazari, Khairul Nashran
    Published 2017
    .... However, the documents may contain sensitive information that is valuable to attackers. Most...
    Get full text
    Thesis
  18. 498
    by Abdullah, Arman Shah
    Published 2015
    ... which act as channels for the aggressive medium to attack the substrate. Duplex and multilayer coatings...
    Get full text
    Thesis
  19. 499
    by Huong, Yu Saint
    Published 2001
    ... evidence on the lower wing surface and negligible on the upper surface at low angle of attack. This trend...
    Get full text
    Thesis
  20. 500
    by Tuan Yusof, Tuan Norizan
    Published 2018
    ...Green leafhopper (GLH), nephotettix virescens is one of the insects that attacks paddy plants...
    Get full text
    Thesis