Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
481by Ali, Mohammed Ahnaf“... that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
482by Arman Shah Abdullah“... which act as channels for the aggressive medium to attack the substrate. Duplex and multilayer coatings...”
Published 2015
Get full text
thesis -
483by Badawi, Ashraf Lotfi Elsayed“... major international crisis namely the Luxor terrorist attack, Iraq war, and September 11. The analysis...”
Published 2011
Get full text
Get full text
Thesis -
484
-
485
-
486by Awawda, Sabreen“... of Islamicjerusalem, obtained statistics that document Israeli occupation attacks on the educational system...”
Published 2020
Get full text
Get full text
Get full text
Thesis -
487by Ahmad, Nazrul Muhaimin“... rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To...”
Published 2018
Get full text
Get full text
Thesis -
488by Zakaria, Muhammad Shakir“... and situation for the plantation industry especially the pest attack in oil palm contribute to human...”
Published 2022
Get full text
Thesis -
489by Ahmed Ali, Ghassan“... perhatian daripada pihak keselamatan rangkaian. Increasing of network attacks with sophisticated forms...”
Published 2011
Get full text
Thesis -
490by Kai, Chong Zan“...This thesis presents a robust packet drop attack detection protocol (named as Separation...”
Published 2010
Thesis -
491by Ariffin, Suriyani“... of differential and linear attacks. There are no three-round linear trails with predictable input-output...”
Published 2012
Get full text
Thesis -
492
-
493
-
494by Al-Wahaibi, Said Bin Khalfan Bin Said“...Recent security attacks have breached some of the most secure networks around the world causing...”
Published 2022
Get full text
Thesis -
495by Ashraf, Muhammad Waqar“... transmission. Natural disasters and physical attacks showed significant impacts on the optical networks...”
Published 2019
Get full text
Thesis -
496by Noor Suhana, Sulaiman“... systems and networks by looking for signatures of known attacks or deviations of normal activity. However...”
Published 2019
Get full text
Thesis -
497by Nazari, Khairul Nashran“.... However, the documents may contain sensitive information that is valuable to attackers. Most...”
Published 2017
Get full text
Thesis -
498by Abdullah, Arman Shah“... which act as channels for the aggressive medium to attack the substrate. Duplex and multilayer coatings...”
Published 2015
Get full text
Thesis -
499by Huong, Yu Saint“... evidence on the lower wing surface and negligible on the upper surface at low angle of attack. This trend...”
Published 2001
Get full text
Thesis -
500by Tuan Yusof, Tuan Norizan“...Green leafhopper (GLH), nephotettix virescens is one of the insects that attacks paddy plants...”
Published 2018
Get full text
Thesis