Showing 541 - 560 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 541
    by Dul Ngajis, Ele Elyiana
    Published 2007
    ... hurricane that had attack some U.S. country make the researcher come out with the title of disaster recovery...
    Get full text
    Thesis
  2. 542
    by Zulkarnain, Mohammed
    Published 2018
    ...In the wake of the September 11, 2001 attacks, home-grown terrorism (HGT) emerged with significant...
    Get full text
    Thesis
  3. 543
    by Fahmi Ariaff, Mohd. Faizz
    Published 2013
    ... stroke, heart attack and heart disease. In this case, accurate blood pressure measurement and prediction...
    Get full text
    Thesis
  4. 544
    by Chin, Yong Jian
    Published 2012
    ... such as - higher degree of freedom, less prone to spoof attacks, and lower error rates. In the proposed solution...
    Thesis
  5. 545
    by Tan, Li Peng
    Published 2014
    ... and Thailand attacking plants form the genus Ocimum, herein its common name, ocimum tingid. Cochlochila bullita...
    Get full text
    Thesis
  6. 546
    by Kojouri, Samira Jilani
    Published 2016
    ..., sulfate attack and drying shrinkage were conducted at late ages up to six months. The SEM, XRD, FTIR, TGA...
    Get full text
    Thesis
  7. 547
  8. 548
    by Jaber, Mustafa Musa
    Published 2016
    ... that caused cannot stop and prevent the attacks of terrorist. Recently, a prevalent relationship between...
    Get full text
    Get full text
    Thesis
  9. 549
    by Noor Suhani, Sulaiman
    Published 2023
    ... findings that may be brought into effective action to decrease the impact of cyber-attacks on government...
    Get full text
    Thesis
  10. 550
    ... uniform attack, some pores and crack developed while on the MgCO₃ coated alloy shows some intergranular...
    Get full text
    Get full text
    Thesis
  11. 551
    by Pricilla Kuilis
    Published 2019
    ... of global safety and security have evolved tremendously with the increasing number of terrorist attacks...
    Get full text
    Get full text
    Thesis
  12. 552
    by Mansour Osman, Huda Osman
    Published 2022
    ... of data. Many studies explained that attackers often reveal the information from third-party services...
    Get full text
    Thesis
  13. 553
    by Mohamed Mhaya, Akram
    Published 2021
    .... Added to that the resistance to carbonation, acid, sulphate attack and elevated temperatures, as well...
    Get full text
    Thesis
  14. 554
    by Abbas, Thamer J.
    Published 2017
    ... that did not prevent the terrorist attacks. Recently, a prevalent relationship between information sharing...
    Get full text
    Get full text
    Thesis
  15. 555
  16. 556
    by Abd Talib, Mohd Saiful
    Published 2005
    ... found in postal mailboxes. Although spam generally not considered as real cyber attack, it may...
    Get full text
    Thesis
  17. 557
    by Aziz, Syaidahtul Badriyah
    Published 2015
    ... are motivated by their different background and need. Physical attack, such as node cloning gives...
    Get full text
    Thesis
  18. 558
    by Ahmad, Ashraf Adamu
    Published 2014
    ..., threat detection, and as a support to electronic attack system. Its main feature is to determine...
    Thesis
  19. 559
    by Ribadu, Abubakar Bashir
    Published 2018
    ... the nature of attacks and threats faced by investors in the NE by the BH terrorists. Secondly, this is also...
    Get full text
    Thesis
  20. 560
    by Zainuddin, Farah Ayiesya
    Published 2019
    ... of attack α = 15° to α = 18°. These angles of attack are the important phases for airfoil during stall...
    Get full text
    Get full text
    Thesis