Showing 521 - 540 results of 1,221 for search '"Attacker"', query time: 0.04s Refine Results
  1. 521
    by Aribake, Fadare Olusolade
    Published 2023
    ... to Phishing Attacks (PA) regardless of its availability. However, PA continues to harm IB users and banking...
    Get full text
    Get full text
    Get full text
    Thesis
  2. 522
    by Azman, Nor Fazalina
    Published 2016
    ... to login to the web page. The proposed technique is proven to mitigate few types of attacks such as Man...
    Get full text
    Thesis
  3. 523
    by Yaacob, Che Mohd Aziz
    Published 2009
    ... sehingga sukar dibendung. On January 4, 2004, an unidentified group attacked a military camp...
    Get full text
    Thesis
  4. 524
    by Omolara, Abiodun Esther
    Published 2020
    ... scheme to address brute-force attacks specifically in the context of password-based encryption systems...
    Get full text
    Thesis
  5. 525
    ... sessions efficiently and effectively are needed to solve database loading, passive attacks...
    Get full text
    Thesis
  6. 526
    by Md Salim, Rafidah
    Published 2008
    ... attacks. Heat treatment is one of the potential treatments to enhance the durability of bamboo...
    Get full text
    Thesis
  7. 527
    by Buhari, Abudhahir
    Published 2015
    ... attacks However, this scheme requires noiseless quantum channel in order to detect the insider...
    Get full text
    Thesis
  8. 528
    by Tuama, Ammar Yaseen
    Published 2016
    ... of an Elliptic Curve equation. In terms of security, the proposed solution is studied against brute-force attacks...
    Get full text
    Thesis
  9. 529
    by Mohammad, Nur Ameera Natasha
    Published 2022
    ... their attacks. This is with a view of fact that an email becomes one of the primary targets of an internal...
    Get full text
    Get full text
    Thesis
  10. 530
    by Juliawati, Alias
    Published 2016
    ... and grain boundaries attack. The presence of high population densities of cathodic Al8Mn5 particles in HFQ...
    Get full text
    Thesis
  11. 531
    ..., density, flexural strength, water absorption, salt attack resistance, thermal conductivity, sound...
    Get full text
    Thesis
  12. 532
    by Muhammad Aizat, Azed
    Published 2021
    ..., the performances of the MSSA concrete towards aggressive environment were identified by using Acid Attack test...
    Get full text
    Thesis
  13. 533
    by Shoukat, Ijaz Ali
    Published 2016
    ... (significant than existing). Moreover, mathematical testing shows that common security attacks...
    Get full text
    Thesis
  14. 534
  15. 535
    by Dahlan, Dahliyusmanto
    Published 2004
    ... detection and anomaly detection. Misuse detection algorithms model know attack behavior. They compare sensor...
    Get full text
    Thesis
  16. 536
    by Ahmed Ali, Ghassan
    Published 2011
    ...) dengan peneroboh. Increasing of network attacks with sophisticated forms has made the network security...
    Get full text
    Thesis
  17. 537
  18. 538
    by Chua , Tze Ping
    Published 2010
    ... for Thermal Interface Materials (TIM) due to its ease of processing, inert to chemical attack, non-toxic...
    Get full text
    Thesis
  19. 539
    by Mohd Zaki, Mohammad Hafizudden
    Published 2018
    ... pitting attack. One way of protecting the aluminium is through coating with less reactive metal...
    Get full text
    Thesis
  20. 540
    .... The impacts of various parameters of baffles which is the attack angle (α  45˚, 60˚, and 90...
    Get full text
    Get full text
    Get full text
    Thesis