Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
541by Dul Ngajis, Ele Elyiana“... hurricane that had attack some U.S. country make the researcher come out with the title of disaster recovery...”
Published 2007
Get full text
Thesis -
542by Zulkarnain, Mohammed“...In the wake of the September 11, 2001 attacks, home-grown terrorism (HGT) emerged with significant...”
Published 2018
Get full text
Thesis -
543by Fahmi Ariaff, Mohd. Faizz“... stroke, heart attack and heart disease. In this case, accurate blood pressure measurement and prediction...”
Published 2013
Get full text
Thesis -
544by Chin, Yong Jian“... such as - higher degree of freedom, less prone to spoof attacks, and lower error rates. In the proposed solution...”
Published 2012
Thesis -
545by Tan, Li Peng“... and Thailand attacking plants form the genus Ocimum, herein its common name, ocimum tingid. Cochlochila bullita...”
Published 2014
Get full text
Thesis -
546by Kojouri, Samira Jilani“..., sulfate attack and drying shrinkage were conducted at late ages up to six months. The SEM, XRD, FTIR, TGA...”
Published 2016
Get full text
Thesis -
547
-
548by Jaber, Mustafa Musa“... that caused cannot stop and prevent the attacks of terrorist. Recently, a prevalent relationship between...”
Published 2016
Get full text
Get full text
Thesis -
549by Noor Suhani, Sulaiman“... findings that may be brought into effective action to decrease the impact of cyber-attacks on government...”
Published 2023
Get full text
Thesis -
550“... uniform attack, some pores and crack developed while on the MgCO₃ coated alloy shows some intergranular...”
Get full text
Get full text
Thesis -
551by Pricilla Kuilis“... of global safety and security have evolved tremendously with the increasing number of terrorist attacks...”
Published 2019
Get full text
Get full text
Thesis -
552by Mansour Osman, Huda Osman“... of data. Many studies explained that attackers often reveal the information from third-party services...”
Published 2022
Get full text
Thesis -
553by Mohamed Mhaya, Akram“.... Added to that the resistance to carbonation, acid, sulphate attack and elevated temperatures, as well...”
Published 2021
Get full text
Thesis -
554by Abbas, Thamer J.“... that did not prevent the terrorist attacks. Recently, a prevalent relationship between information sharing...”
Published 2017
Get full text
Get full text
Thesis -
555
-
556by Abd Talib, Mohd Saiful“... found in postal mailboxes. Although spam generally not considered as real cyber attack, it may...”
Published 2005
Get full text
Thesis -
557by Aziz, Syaidahtul Badriyah“... are motivated by their different background and need. Physical attack, such as node cloning gives...”
Published 2015
Get full text
Thesis -
558by Ahmad, Ashraf Adamu“..., threat detection, and as a support to electronic attack system. Its main feature is to determine...”
Published 2014
Thesis -
559by Ribadu, Abubakar Bashir“... the nature of attacks and threats faced by investors in the NE by the BH terrorists. Secondly, this is also...”
Published 2018
Get full text
Thesis -
560by Zainuddin, Farah Ayiesya“... of attack α = 15° to α = 18°. These angles of attack are the important phases for airfoil during stall...”
Published 2019
Get full text
Get full text
Thesis