Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
501by Abdullah, Ahmad Shafawi“.... It was observed that bio mimetic design generated 50% more lift at 10° angle of attack compare to same profile...”
Published 2019
Get full text
Get full text
Thesis -
502by Jamal, Zalifh“... in 2013 reached 600 million, and has grown rapidly in recent years. Malware can attack a wide variety...”
Published 2017
Get full text
Get full text
Thesis -
503by Mubarak, Mohd Faizal“... that unprotected RFID platform can be compromised either by malicious codes or man in the middle attack. System...”
Published 2010
Get full text
Thesis -
504by Mohd Lokman, Syiham“... steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted...”
Published 2023
Get full text
Get full text
Get full text
Thesis -
505by Jamal, Fara“... a security attack. Also, user attributes are stored in the block storage using an InterPlanetary...”
Published 2021
Get full text
Thesis -
506by Said, Mazuriah“... for the aerodynamic studies. Diamond wing is also a kind of delta-shaped wing where at certain angle of attack...”
Published 2021
Get full text
Thesis -
507by Siti Suhaila, Sabarudin“... and 40 mm) and grouser angle of attack (0 and 30-degree). The observation focuses on the flow of sand...”
Published 2022
Get full text
Thesis -
508by M. Elkamel, Hasan Taher“... angles of attacks and Mach numbers. The comparison result over these two airfoil models had found...”
Published 2017
Get full text
Get full text
Thesis -
509by Fara, Jamal“... on their network to run the business. Computer threats such as virus, worms and attack like DDOS, hackers emerge...”
Published 2006
Get full text
Get full text
Thesis -
510by Norkhushaini, Awang“... operating systems. Two computers have been connected to stimulate the attacking scenario such as in computer...”
Published 2004
Get full text
Get full text
Thesis -
511by Shaban, Abdullah Ibrahim“...Text-based passwords for authentication are exposed to the dictionary attack as users tend...”
Published 2017
Get full text
Get full text
Thesis -
512by Khairunnisa, Khairunnisa“...Primary school children who develop asthmatic attack during school hours required assistance from...”
Published 2012
Get full text
Thesis -
513by Asbullah, Muhammad Asyraf“... security goal and the strong attack model, namely the indistinguishability and the chosen-ciphertext attack...”
Published 2015
Get full text
Thesis -
514by Mohamed, Kartini“... and protect the system from several attacks such as brute force and tampering attacks. Therefore, the use...”
Published 2017
Get full text
Thesis -
515by Najafabadi, Seyed Abdolrahman Mousavian“... of the malicious attackers to violate the security and privacy by spreading malicious codes over a wider range...”
Published 2016
Get full text
Thesis -
516by Suziee, Sukarti“... of corrosion attack has also been discussed on the basis of the morphology and the content properties...”
Published 2013
Get full text
Get full text
Thesis -
517by Alquraishee, Anser Ghazzaal Ali“... powerful devices. The proposed scheme uniquely combined the Inverse Collusion Attack Algorithm (CAA...”
Published 2022
Get full text
Thesis -
518by Ismail, Noraini“... for the charges’ journey during epilepsy attack. Exact solution to the Einstein Field equation of fluid which...”
Published 2013
Get full text
Thesis -
519
-
520