Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
621by Kanaan Ismael, Marwan“... the data from malicious attack. The technique proposed in this research is using Hash function...”
Published 2020
Get full text
Get full text
Get full text
Thesis -
622by Mustapha, Mohammed“... attacks by the BH terror group in northeastern Nigeria, with devastating consequences on the national...”
Published 2022
Get full text
Thesis -
623by Bahrain, Siti Nurul Izzah“... emerged as a pivotal solution for detecting and mitigating face-spoofing attacks....”
Published 2024
Get full text
Thesis -
624
-
625by Morufu, Olalere“... lost mobile device of an employee, by shoulder surfing password attacks and password guessing attacks...”
Published 2016
Get full text
Thesis -
626by Olufemi, Osaji Emmanuel“... protection scheme design. The high-cost of implementations, cyber-attack, and latency concerns from...”
Published 2020
Get full text
Thesis -
627by Ahmad, Mohd Najib“... attack of 10%-50% leaf damage may cause 43% yield loss. The population of bagworms if not controlled...”
Published 2020
Get full text
Thesis -
628by Rashid, Mustafa Noori“... to attackers and the cloud provider. By applying the proxy signature technique, the group leader can...”
Published 2018
Get full text
Thesis -
629
-
630by Kamarudin, Mohd Soleham Juraimi“... attack on the mild steel area, This investigation has shown that ER 309L and ER308L filler metals can...”
Published 2009
Get full text
Thesis -
631by Shareeda, Mahmood Arif Lafta Al“... of an open wireless communication medium where messages are exchanged in the plain text allowing attackers...”
Published 2022
Get full text
Thesis -
632by Jerai@Junaidi, Fauziah“.../s, 18 m/s and 20 m/s, at different angle of attack. The aerodynamics characteristics lift and drag...”
Published 2007
Get full text
Thesis -
633by Ramli, Ridzwan Syahmi“...The word silat means a kind of sport or game, which consists of quick movements in attacking...”
Published 2022
Get full text
Thesis -
634by Ghanem, Waheed Ali Hussein Mohammed“... of neural networks on classifying those features into normal and attack instances. To realize...”
Published 2019
Get full text
Thesis -
635by Ali Hassan, Abdullah Alashw Al“.... There was no history of previous similar attack and no medical illness had been known. Social history revealed that he...”
Published 2008
Get full text
Thesis -
636by Raja Mohd. Radzi, Raja Zahilah“... applications, such as target identification and tracking. WSN are prone to failure and malicious user attack...”
Published 2007
Get full text
Thesis -
637by Amiri, Mohammad Faisal“... of terrorist attacks on the public bus. Therefore, such issues were critical challenges for the Afghan...”
Published 2020
Get full text
Thesis -
638by Mat Noor, Noor Jasmawati“... region. After immersed the brazed joints for 12 hours, pitting attack was concentrated on the copper...”
Published 2011
Thesis -
639by Jaafar, Mohd Yazid Mohd“... proved that the proposed protocol can resist known attacks against VoIP communication....”
Published 2013
Get full text
Thesis -
640by Hassan Ali, Abdinasir“... of wireless communication to protect against any attack using technical approach that implements...”
Published 2010
Get full text
Thesis