Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
561
-
562by Lee, Soon Heng“... in controlling termite attacks. Therefore, further studied had been carry out using OPT and Rubberwood...”
Published 2015
Get full text
Thesis -
563by Partowazar, Baharak“... these factors, other external factors such as September 11 attacks, labeling Iran as “axis of evil” by George...”
Published 2016
Get full text
Thesis -
564by Haider, Bilal“... angle of attack (AOA). Despite of many studies in flow topology for the low sweep wings at a medium...”
Published 2022
Get full text
Thesis -
565by Atefi, Kayvan“..., therefore the results may no longer be applicable and are not reliable within the current attacks. Further...”
Published 2019
Get full text
Thesis -
566by Abu Bakar, Hafizal“... ratio at angle of attack range from 0° - 12° the recorded value is smaller than the published data due...”
Published 2011
Get full text
Thesis -
567by Kadir, Ramlah“... be fatal and one of the leading causes of death and illness in the world. The bacteria typi cally attack...”
Published 2016
Get full text
Thesis -
568by Rasdi, Rasnaizam“... be fatal and one of the leading causes of death and illness in the world. The bacteria typi cally attack...”
Published 2016
Get full text
Thesis -
569
-
570
-
571by Nabilla, Mohamad“... attack, concrete containing 10% CBA exhibited the lowest mass loss and strength deterioration. The Field...”
Published 2023
Get full text
Thesis -
572by Jegede, Abayomi Joshua“... be used to carry out replay, template reconstruction attacks, and other unscrupulous activities...”
Published 2017
Get full text
Thesis -
573by Yahya, Nor Hayati“... and is the result of a destructive attack by chemical or electrochemical reactions with its environment...”
Published 2002
Get full text
Thesis -
574by Adnan, Nurul Anis Suriana“.... This proposes a passive forgery detection to detect the most common type of forgery, which is copy-move attack...”
Published 2017
Get full text
Thesis -
575by Abu-Baker Alkalaaf, Howida“.... The weakness of current key agreement makes user privacy vulnerable to attack. To address that issue...”
Published 2014
Thesis -
576by Boujarian, Sima“... that is connected to this technology is keeping data secure. Many attackers try to obtain secret information...”
Published 2013
Get full text
Thesis -
577by Nateghizad, Majid“... attacks. Furthermore, the search performances of proposed searchable encryption algorithms that are index...”
Published 2014
Thesis -
578by Ali, Mohamed Assnousi“... attack also showed that the type of corrosion is that of uniform instead of localized. The low corrosion...”
Published 2009
Get full text
Thesis -
579by Hew, Kean Yung“... testability and reliability, which in turn will protect the system from attack and will incur less testing...”
Published 2008
Get full text
Thesis -
580by Alkhushayni, Suboh Mohammad Shehadah“... malicious attacks over the Internet[l]. Snort is a lightweight intrusion detection system that can log...”
Published 2008
Get full text
Get full text
Thesis