Showing 561 - 580 results of 1,221 for search '"Attacker"', query time: 0.07s Refine Results
  1. 561
  2. 562
    by Lee, Soon Heng
    Published 2015
    ... in controlling termite attacks. Therefore, further studied had been carry out using OPT and Rubberwood...
    Get full text
    Thesis
  3. 563
    by Partowazar, Baharak
    Published 2016
    ... these factors, other external factors such as September 11 attacks, labeling Iran as “axis of evil” by George...
    Get full text
    Thesis
  4. 564
    by Haider, Bilal
    Published 2022
    ... angle of attack (AOA). Despite of many studies in flow topology for the low sweep wings at a medium...
    Get full text
    Thesis
  5. 565
    by Atefi, Kayvan
    Published 2019
    ..., therefore the results may no longer be applicable and are not reliable within the current attacks. Further...
    Get full text
    Thesis
  6. 566
    by Abu Bakar, Hafizal
    Published 2011
    ... ratio at angle of attack range from 0° - 12° the recorded value is smaller than the published data due...
    Get full text
    Thesis
  7. 567
    by Kadir, Ramlah
    Published 2016
    ... be fatal and one of the leading causes of death and illness in the world. The bacteria typi cally attack...
    Get full text
    Thesis
  8. 568
    by Rasdi, Rasnaizam
    Published 2016
    ... be fatal and one of the leading causes of death and illness in the world. The bacteria typi cally attack...
    Get full text
    Thesis
  9. 569
  10. 570
  11. 571
    by Nabilla, Mohamad
    Published 2023
    ... attack, concrete containing 10% CBA exhibited the lowest mass loss and strength deterioration. The Field...
    Get full text
    Thesis
  12. 572
    by Jegede, Abayomi Joshua
    Published 2017
    ... be used to carry out replay, template reconstruction attacks, and other unscrupulous activities...
    Get full text
    Thesis
  13. 573
    by Yahya, Nor Hayati
    Published 2002
    ... and is the result of a destructive attack by chemical or electrochemical reactions with its environment...
    Get full text
    Thesis
  14. 574
    by Adnan, Nurul Anis Suriana
    Published 2017
    .... This proposes a passive forgery detection to detect the most common type of forgery, which is copy-move attack...
    Get full text
    Thesis
  15. 575
    by Abu-Baker Alkalaaf, Howida
    Published 2014
    .... The weakness of current key agreement makes user privacy vulnerable to attack. To address that issue...
    Thesis
  16. 576
    by Boujarian, Sima
    Published 2013
    ... that is connected to this technology is keeping data secure. Many attackers try to obtain secret information...
    Get full text
    Thesis
  17. 577
    by Nateghizad, Majid
    Published 2014
    ... attacks. Furthermore, the search performances of proposed searchable encryption algorithms that are index...
    Thesis
  18. 578
    by Ali, Mohamed Assnousi
    Published 2009
    ... attack also showed that the type of corrosion is that of uniform instead of localized. The low corrosion...
    Get full text
    Thesis
  19. 579
    by Hew, Kean Yung
    Published 2008
    ... testability and reliability, which in turn will protect the system from attack and will incur less testing...
    Get full text
    Thesis
  20. 580
    ... malicious attacks over the Internet[l]. Snort is a lightweight intrusion detection system that can log...
    Get full text
    Get full text
    Thesis