Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
721by Mohd Azri, Nur Addamera Afieqa, Abdul Ghani, Fatimah Azzahraa, Roslan, Nur Amni Natasya“..., uses an integer finite field, making it easy for attackers and criminal activists to intervene. Hence...”
Published 2023
Get full text
Thesis -
722by Rasheed, Mohammad M.“... instead of anomaly-based technology. Signature-based technology can only detect known attacks...”
Published 2012
Get full text
Get full text
Thesis -
723
-
724by Tan, Colin Choon Lin“... phishing attacks. Mainstream solutions and technical approaches for phishing detection suffer from inherent...”
Published 2021
Get full text
Thesis -
725by Sarimin, Mas Intaniah“... getting worse with the increasing number of the physical attacks among school students, fighting, rape...”
Published 2012
Get full text
Thesis -
726by Saahar @ Saabar, Suhaimee“..., attacking, informing and manipulate the voters' information seeking and voting behaviour. In this study...”
Published 2018
Get full text
Thesis -
727by Ab Rahim, Rahmah Mardhiah“... attack or the heart rate is high....”
Published 2020
Get full text
Thesis -
728by Abdul Rauf, Abdul Rauf“... of users as well as cloud resources from inside and outside attacks....”
Published 2019
Get full text
Thesis -
729by Mohd. Zulkimi, Noor Amira Zuraini“... hardware or software attacks. The symmetric encryption method works great for fast encryption of large data...”
Published 2021
Get full text
Thesis -
730by Lee, Wei Qi“... to heart attack and stroke. The occurrence and prevalence of atrial fibrillation (AF) is growing worldwide...”
Published 2022
Get full text
Thesis -
731by Syed Abdul Malik, Sharifah Nurul Shahira“...In Malaysia, the ringgit came under speculative attack and also declined significantly that would...”
Published 2017
Get full text
Thesis -
732“... of techniques for this piece is attacking the string with thumb pull and muting the string with right or left...”
Get full text
Thesis -
733by Zulkifli, Normah Erra“...'s economy had been attacked by the sudden crises, where it literally distracts the banking characteristics...”
Published 2022
Get full text
Thesis -
734by Kumarasamy, Sharmendran“... Reinforced Polymer (GFRP) composite due to fuel attack has been experimentally investigated. Three types...”
Published 2019
Get full text
Thesis -
735by Jabas, Hatem Nabih“... attack system. Its main feature is to determine the Pulse Descriptor Words (PDWs) which consists of: 1...”
Published 2018
Get full text
Thesis -
736by Fadhil, Ammar Mohammedali“... is distributed over the entire image to maintain high level of security against any kind of attack. One-bit...”
Published 2016
Get full text
Thesis -
737by Ismail, Che Shuraya Che“... clots that are excessively large and obstruct blood flow. Heart attack, stroke or pulmonary embolism...”
Published 2005
Get full text
Thesis -
738by Abdullah Aleidan, Fouziah Saleh“...Distributing digital information electronically is vulnerable to a variety of attacks and attempts...”
Published 2009
Thesis -
739by Naraei, Parisa“... characteristic makes non-mobile device an easy target to attack. Therefore, the security level they require...”
Published 2013
Get full text
Thesis -
740by Ngaini, Zainab“... to protonate the epoxy group of ENR-50 that promoted the attack by meta~ Aminophenol to the polymer backbone...”
Published 1995
Get full text
Thesis