Showing 621 - 640 results of 1,221 for search '"Attacker"', query time: 0.04s Refine Results
  1. 621
    by Kanaan Ismael, Marwan
    Published 2020
    ... the data from malicious attack. The technique proposed in this research is using Hash function...
    Get full text
    Get full text
    Get full text
    Thesis
  2. 622
    by Mustapha, Mohammed
    Published 2022
    ... attacks by the BH terror group in northeastern Nigeria, with devastating consequences on the national...
    Get full text
    Thesis
  3. 623
    by Bahrain, Siti Nurul Izzah
    Published 2024
    ... emerged as a pivotal solution for detecting and mitigating face-spoofing attacks....
    Get full text
    Thesis
  4. 624
  5. 625
    by Morufu, Olalere
    Published 2016
    ... lost mobile device of an employee, by shoulder surfing password attacks and password guessing attacks...
    Get full text
    Thesis
  6. 626
    by Olufemi, Osaji Emmanuel
    Published 2020
    ... protection scheme design. The high-cost of implementations, cyber-attack, and latency concerns from...
    Get full text
    Thesis
  7. 627
    by Ahmad, Mohd Najib
    Published 2020
    ... attack of 10%-50% leaf damage may cause 43% yield loss. The population of bagworms if not controlled...
    Get full text
    Thesis
  8. 628
    by Rashid, Mustafa Noori
    Published 2018
    ... to attackers and the cloud provider. By applying the proxy signature technique, the group leader can...
    Get full text
    Thesis
  9. 629
  10. 630
    ... attack on the mild steel area, This investigation has shown that ER 309L and ER308L filler metals can...
    Get full text
    Thesis
  11. 631
    ... of an open wireless communication medium where messages are exchanged in the plain text allowing attackers...
    Get full text
    Thesis
  12. 632
    by Jerai@Junaidi, Fauziah
    Published 2007
    .../s, 18 m/s and 20 m/s, at different angle of attack. The aerodynamics characteristics lift and drag...
    Get full text
    Thesis
  13. 633
    by Ramli, Ridzwan Syahmi
    Published 2022
    ...The word silat means a kind of sport or game, which consists of quick movements in attacking...
    Get full text
    Thesis
  14. 634
    ... of neural networks on classifying those features into normal and attack instances. To realize...
    Get full text
    Thesis
  15. 635
    by Ali Hassan, Abdullah Alashw Al
    Published 2008
    .... There was no history of previous similar attack and no medical illness had been known. Social history revealed that he...
    Get full text
    Thesis
  16. 636
    by Raja Mohd. Radzi, Raja Zahilah
    Published 2007
    ... applications, such as target identification and tracking. WSN are prone to failure and malicious user attack...
    Get full text
    Thesis
  17. 637
    by Amiri, Mohammad Faisal
    Published 2020
    ... of terrorist attacks on the public bus. Therefore, such issues were critical challenges for the Afghan...
    Get full text
    Thesis
  18. 638
    by Mat Noor, Noor Jasmawati
    Published 2011
    ... region. After immersed the brazed joints for 12 hours, pitting attack was concentrated on the copper...
    Thesis
  19. 639
    by Jaafar, Mohd Yazid Mohd
    Published 2013
    ... proved that the proposed protocol can resist known attacks against VoIP communication....
    Get full text
    Thesis
  20. 640
    by Hassan Ali, Abdinasir
    Published 2010
    ... of wireless communication to protect against any attack using technical approach that implements...
    Get full text
    Thesis