Showing 501 - 520 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 501
    by Abdullah, Ahmad Shafawi
    Published 2019
    .... It was observed that bio mimetic design generated 50% more lift at 10° angle of attack compare to same profile...
    Get full text
    Get full text
    Thesis
  2. 502
    by Jamal, Zalifh
    Published 2017
    ... in 2013 reached 600 million, and has grown rapidly in recent years. Malware can attack a wide variety...
    Get full text
    Get full text
    Thesis
  3. 503
    by Mubarak, Mohd Faizal
    Published 2010
    ... that unprotected RFID platform can be compromised either by malicious codes or man in the middle attack. System...
    Get full text
    Thesis
  4. 504
    by Mohd Lokman, Syiham
    Published 2023
    ... steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted...
    Get full text
    Get full text
    Get full text
    Thesis
  5. 505
    by Jamal, Fara
    Published 2021
    ... a security attack. Also, user attributes are stored in the block storage using an InterPlanetary...
    Get full text
    Thesis
  6. 506
    by Said, Mazuriah
    Published 2021
    ... for the aerodynamic studies. Diamond wing is also a kind of delta-shaped wing where at certain angle of attack...
    Get full text
    Thesis
  7. 507
    by Siti Suhaila, Sabarudin
    Published 2022
    ... and 40 mm) and grouser angle of attack (0 and 30-degree). The observation focuses on the flow of sand...
    Get full text
    Thesis
  8. 508
    by M. Elkamel, Hasan Taher
    Published 2017
    ... angles of attacks and Mach numbers. The comparison result over these two airfoil models had found...
    Get full text
    Get full text
    Thesis
  9. 509
    by Fara, Jamal
    Published 2006
    ... on their network to run the business. Computer threats such as virus, worms and attack like DDOS, hackers emerge...
    Get full text
    Get full text
    Thesis
  10. 510
    by Norkhushaini, Awang
    Published 2004
    ... operating systems. Two computers have been connected to stimulate the attacking scenario such as in computer...
    Get full text
    Get full text
    Thesis
  11. 511
    by Shaban, Abdullah Ibrahim
    Published 2017
    ...Text-based passwords for authentication are exposed to the dictionary attack as users tend...
    Get full text
    Get full text
    Thesis
  12. 512
    by Khairunnisa, Khairunnisa
    Published 2012
    ...Primary school children who develop asthmatic attack during school hours required assistance from...
    Get full text
    Thesis
  13. 513
    by Asbullah, Muhammad Asyraf
    Published 2015
    ... security goal and the strong attack model, namely the indistinguishability and the chosen-ciphertext attack...
    Get full text
    Thesis
  14. 514
    by Mohamed, Kartini
    Published 2017
    ... and protect the system from several attacks such as brute force and tampering attacks. Therefore, the use...
    Get full text
    Thesis
  15. 515
    ... of the malicious attackers to violate the security and privacy by spreading malicious codes over a wider range...
    Get full text
    Thesis
  16. 516
    by Suziee, Sukarti
    Published 2013
    ... of corrosion attack has also been discussed on the basis of the morphology and the content properties...
    Get full text
    Get full text
    Thesis
  17. 517
    ... powerful devices. The proposed scheme uniquely combined the Inverse Collusion Attack Algorithm (CAA...
    Get full text
    Thesis
  18. 518
    by Ismail, Noraini
    Published 2013
    ... for the charges’ journey during epilepsy attack. Exact solution to the Einstein Field equation of fluid which...
    Get full text
    Thesis
  19. 519
    by Ahmad, Mohammad Abdulateef
    Published 2014
    Get full text
    Thesis
  20. 520