Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
581by Munirah, Mohd. Yusof“... attack. The medical knowledge is store in the knowledge base in the form of production rules (IFITHEN...”
Published 2002
Get full text
Get full text
Thesis -
582by Ayad, Mustafa Abdsalam“... to authenticate a client, depending on the smart card usage. The major attacks that affect the smart card...”
Published 2002
Get full text
Thesis -
583by Al-Mohammed, Wael Hasan Ali“... of attacks on important information over the network systems is increasing with every year. Intrusion...”
Published 2015
Get full text
Get full text
Thesis -
584by Salih, Moslih Amer“... by exposing the mortar to extreme environments, namely elevated temperatures and sulfate attack...”
Published 2015
Get full text
Thesis -
585by Iyus, Yosep“... (46.7%) of nurses reported being verbally abuse, 29.2% claimed to be physically attacked, and 24.2...”
Published 2021
Get full text
Get full text
Thesis -
586by Hameed, Mustafa Emad“... for high-level security against for various kinds of attacks such as denial-of-service (DoS), Distributed...”
Published 2022
Get full text
Get full text
Thesis -
587by Othman, Nurain“... of attack (a). Rotor aerodynamics was modelled using Computational Fluid Dynamics by employing sliding mesh...”
Published 2022
Get full text
Thesis -
588by Sulong, Mek Rahmah“...) test for any Subkeys. These contribute to some attacks in the Key Schedule. Thus, a new transformation...”
Published 2008
Get full text
Thesis -
589
-
590
-
591by Nabila, Satibi“....). Various diseases attacked this black pepper but most common disease is root rot caused by Phytophthora...”
Published 2014
Get full text
Thesis -
592by Arsat, Zainal Abidin“... respectively. The aerodynamics analyses were covered on 1.5m and 2m altitudes with various angles of attack...”
Published 2009
Get full text
Thesis -
593by Abdul Ghani, Mohd Hafiz Hilmi“... that is capable to detect and protect their assets from being harmed and exploited by attackers. This project...”
Published 2012
Get full text
Thesis -
594by Mohamed Suffian, Mohd. Harridon“..., intrusion by means of SYN attack, intrusion by means of 'URG Flag' packets, and intrusion via web Contents...”
Published 2003
Get full text
Thesis -
595by Abdulawi, Mohd Yusof Safaruddin“... characteristics are validated using two-dimensional transonic airfoil at various angles of attack. This thesis...”
Published 2006
Get full text
Thesis -
596by Zainudin, Anaz Nazren“...+ to obtain its drag and lift coefficient. Every shape is simulated in various angles of attack in order...”
Published 2010
Get full text
Thesis -
597by Mohd Yusoff, Nurhumaira“... expertise to monitor the crops from the attack of pests and insects. This approach is susceptible to human...”
Published 2021
Get full text
Thesis -
598by Paraman, Norlina“...Software development for network monitoring is very important to discover new ways of attacking...”
Published 2005
Get full text
Thesis -
599by Sarkheyli, Azadeh“... failure for instance no specific function which recover/avoid risks/attacks toward IS/IT component...”
Published 2011
Get full text
Thesis -
600by Sabtu@Othman, Hilyati“...Chloride attack is one of the main causes of corrosion of steel structures exposed to marine...”
Published 2009
Get full text
Thesis