Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
521by Aribake, Fadare Olusolade“... to Phishing Attacks (PA) regardless of its availability. However, PA continues to harm IB users and banking...”
Published 2023
Get full text
Get full text
Get full text
Thesis -
522by Azman, Nor Fazalina“... to login to the web page. The proposed technique is proven to mitigate few types of attacks such as Man...”
Published 2016
Get full text
Thesis -
523by Yaacob, Che Mohd Aziz“... sehingga sukar dibendung. On January 4, 2004, an unidentified group attacked a military camp...”
Published 2009
Get full text
Thesis -
524by Omolara, Abiodun Esther“... scheme to address brute-force attacks specifically in the context of password-based encryption systems...”
Published 2020
Get full text
Thesis -
525by al-Dala'ien, Mu'awya Naser Salam“... sessions efficiently and effectively are needed to solve database loading, passive attacks...”
Published 2011
Get full text
Thesis -
526by Md Salim, Rafidah“... attacks. Heat treatment is one of the potential treatments to enhance the durability of bamboo...”
Published 2008
Get full text
Thesis -
527by Buhari, Abudhahir“... attacks However, this scheme requires noiseless quantum channel in order to detect the insider...”
Published 2015
Get full text
Thesis -
528by Tuama, Ammar Yaseen“... of an Elliptic Curve equation. In terms of security, the proposed solution is studied against brute-force attacks...”
Published 2016
Get full text
Thesis -
529by Mohammad, Nur Ameera Natasha“... their attacks. This is with a view of fact that an email becomes one of the primary targets of an internal...”
Published 2022
Get full text
Get full text
Thesis -
530by Juliawati, Alias“... and grain boundaries attack. The presence of high population densities of cathodic Al8Mn5 particles in HFQ...”
Published 2016
Get full text
Thesis -
531by Mohd Pahroraji, Mohamad Ezad Hafez“..., density, flexural strength, water absorption, salt attack resistance, thermal conductivity, sound...”
Published 2017
Get full text
Thesis -
532by Muhammad Aizat, Azed“..., the performances of the MSSA concrete towards aggressive environment were identified by using Acid Attack test...”
Published 2021
Get full text
Thesis -
533by Shoukat, Ijaz Ali“... (significant than existing). Moreover, mathematical testing shows that common security attacks...”
Published 2016
Get full text
Thesis -
534
-
535by Dahlan, Dahliyusmanto“... detection and anomaly detection. Misuse detection algorithms model know attack behavior. They compare sensor...”
Published 2004
Get full text
Thesis -
536by Ahmed Ali, Ghassan“...) dengan peneroboh. Increasing of network attacks with sophisticated forms has made the network security...”
Published 2011
Get full text
Thesis -
537by Lee, Kok Onn“... the wood against insect and fungal attack. ...”
Published 2007
Get full text
Thesis -
538by Chua , Tze Ping“... for Thermal Interface Materials (TIM) due to its ease of processing, inert to chemical attack, non-toxic...”
Published 2010
Get full text
Thesis -
539by Mohd Zaki, Mohammad Hafizudden“... pitting attack. One way of protecting the aluminium is through coating with less reactive metal...”
Published 2018
Get full text
Thesis -
540by Muhsin Al-Juhaishi, Lafta Flayih“.... The impacts of various parameters of baffles which is the attack angle (α 45˚, 60˚, and 90...”
Published 2021
Get full text
Get full text
Get full text
Thesis