Showing 721 - 740 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 721
  2. 722
    by Rasheed, Mohammad M.
    Published 2012
    ... instead of anomaly-based technology. Signature-based technology can only detect known attacks...
    Get full text
    Get full text
    Thesis
  3. 723
  4. 724
    by Tan, Colin Choon Lin
    Published 2021
    ... phishing attacks. Mainstream solutions and technical approaches for phishing detection suffer from inherent...
    Get full text
    Thesis
  5. 725
    by Sarimin, Mas Intaniah
    Published 2012
    ... getting worse with the increasing number of the physical attacks among school students, fighting, rape...
    Get full text
    Thesis
  6. 726
  7. 727
  8. 728
    by Abdul Rauf, Abdul Rauf
    Published 2019
    ... of users as well as cloud resources from inside and outside attacks....
    Get full text
    Thesis
  9. 729
    ... hardware or software attacks. The symmetric encryption method works great for fast encryption of large data...
    Get full text
    Thesis
  10. 730
    by Lee, Wei Qi
    Published 2022
    ... to heart attack and stroke. The occurrence and prevalence of atrial fibrillation (AF) is growing worldwide...
    Get full text
    Thesis
  11. 731
    ...In Malaysia, the ringgit came under speculative attack and also declined significantly that would...
    Get full text
    Thesis
  12. 732
  13. 733
    by Zulkifli, Normah Erra
    Published 2022
    ...'s economy had been attacked by the sudden crises, where it literally distracts the banking characteristics...
    Get full text
    Thesis
  14. 734
    by Kumarasamy, Sharmendran
    Published 2019
    ... Reinforced Polymer (GFRP) composite due to fuel attack has been experimentally investigated. Three types...
    Get full text
    Thesis
  15. 735
    by Jabas, Hatem Nabih
    Published 2018
    ... attack system. Its main feature is to determine the Pulse Descriptor Words (PDWs) which consists of: 1...
    Get full text
    Thesis
  16. 736
    by Fadhil, Ammar Mohammedali
    Published 2016
    ... is distributed over the entire image to maintain high level of security against any kind of attack. One-bit...
    Get full text
    Thesis
  17. 737
    by Ismail, Che Shuraya Che
    Published 2005
    ... clots that are excessively large and obstruct blood flow. Heart attack, stroke or pulmonary embolism...
    Get full text
    Thesis
  18. 738
    ...Distributing digital information electronically is vulnerable to a variety of attacks and attempts...
    Thesis
  19. 739
    by Naraei, Parisa
    Published 2013
    ... characteristic makes non-mobile device an easy target to attack. Therefore, the security level they require...
    Get full text
    Thesis
  20. 740
    by Ngaini, Zainab
    Published 1995
    ... to protonate the epoxy group of ENR-50 that promoted the attack by meta~ Aminophenol to the polymer backbone...
    Get full text
    Thesis