Showing 581 - 600 results of 1,221 for search '"Attacker"', query time: 0.04s Refine Results
  1. 581
    by Munirah, Mohd. Yusof
    Published 2002
    ... attack. The medical knowledge is store in the knowledge base in the form of production rules (IFITHEN...
    Get full text
    Get full text
    Thesis
  2. 582
    by Ayad, Mustafa Abdsalam
    Published 2002
    ... to authenticate a client, depending on the smart card usage. The major attacks that affect the smart card...
    Get full text
    Thesis
  3. 583
    by Al-Mohammed, Wael Hasan Ali
    Published 2015
    ... of attacks on important information over the network systems is increasing with every year. Intrusion...
    Get full text
    Get full text
    Thesis
  4. 584
    by Salih, Moslih Amer
    Published 2015
    ... by exposing the mortar to extreme environments, namely elevated temperatures and sulfate attack...
    Get full text
    Thesis
  5. 585
    by Iyus, Yosep
    Published 2021
    ... (46.7%) of nurses reported being verbally abuse, 29.2% claimed to be physically attacked, and 24.2...
    Get full text
    Get full text
    Thesis
  6. 586
    by Hameed, Mustafa Emad
    Published 2022
    ... for high-level security against for various kinds of attacks such as denial-of-service (DoS), Distributed...
    Get full text
    Get full text
    Thesis
  7. 587
    by Othman, Nurain
    Published 2022
    ... of attack (a). Rotor aerodynamics was modelled using Computational Fluid Dynamics by employing sliding mesh...
    Get full text
    Thesis
  8. 588
    by Sulong, Mek Rahmah
    Published 2008
    ...) test for any Subkeys. These contribute to some attacks in the Key Schedule. Thus, a new transformation...
    Get full text
    Thesis
  9. 589
  10. 590
  11. 591
    by Nabila, Satibi
    Published 2014
    ....). Various diseases attacked this black pepper but most common disease is root rot caused by Phytophthora...
    Get full text
    Thesis
  12. 592
    by Arsat, Zainal Abidin
    Published 2009
    ... respectively. The aerodynamics analyses were covered on 1.5m and 2m altitudes with various angles of attack...
    Get full text
    Thesis
  13. 593
    by Abdul Ghani, Mohd Hafiz Hilmi
    Published 2012
    ... that is capable to detect and protect their assets from being harmed and exploited by attackers. This project...
    Get full text
    Thesis
  14. 594
    ..., intrusion by means of SYN attack, intrusion by means of 'URG Flag' packets, and intrusion via web Contents...
    Get full text
    Thesis
  15. 595
  16. 596
    by Zainudin, Anaz Nazren
    Published 2010
    ...+ to obtain its drag and lift coefficient. Every shape is simulated in various angles of attack in order...
    Get full text
    Thesis
  17. 597
    by Mohd Yusoff, Nurhumaira
    Published 2021
    ... expertise to monitor the crops from the attack of pests and insects. This approach is susceptible to human...
    Get full text
    Thesis
  18. 598
    by Paraman, Norlina
    Published 2005
    ...Software development for network monitoring is very important to discover new ways of attacking...
    Get full text
    Thesis
  19. 599
    by Sarkheyli, Azadeh
    Published 2011
    ... failure for instance no specific function which recover/avoid risks/attacks toward IS/IT component...
    Get full text
    Thesis
  20. 600
    by Sabtu@Othman, Hilyati
    Published 2009
    ...Chloride attack is one of the main causes of corrosion of steel structures exposed to marine...
    Get full text
    Thesis