Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
741by Altaher Mohamed, Mohamed Abdalwahab“... too much with angle of attack and also not much pressure losses at the time, the airflow entering...”
Published 2011
Get full text
Get full text
Get full text
Thesis -
742by Najiahtul Syafiqah, Ismail“... diagram of DroidKungFu1 and generate attack pattern of DroidKungFu1. This result will help future...”
Published 2013
Get full text
Get full text
Thesis -
743
-
744
-
745
-
746by Amirulikhsan, Zolkafli“... communication in spreading their ideologies and attack plans by hiding malicious materials in digital images via...”
Published 2008
Get full text
Get full text
Thesis -
747by Suryanti, Awang“... to the ability to avoid spoof attack since it is difficult for impostor to imitate two different characteristics...”
Published 2015
Get full text
Thesis -
748by Ahmad, Asma Hana“... struggle of an unfortunate victim due to cruel environment; and finally, Jude the Obscure (1895) attacks...”
Published 2003
Get full text
Thesis -
749by Thamarakshan, Shalima“... of bullying are divided into six forms, namely work-related bullying, personal attacks, social isolation...”
Published 2015
Get full text
Get full text
Thesis -
750by Ibrahim, Mimi Dalina“... used internet widely. However, the number of attack, suspicious event and vulnerabilities in internet...”
Published 2016
Get full text
Get full text
Thesis -
751by H. Belgassem, Seddeq“.... The Science of cryptography provides one means to combat these attacks. These include encryption, decryption...”
Published 2004
Get full text
Thesis -
752by Malallah, Fahad Layth“..., online signature biometric requires the use of template database which is vulnerable to attacks...”
Published 2014
Get full text
Thesis -
753by Abd Aziz, Norazah“... the security goals. Analysis on TLS+MA protocol shows that it is resistant against replay and collusion attacks...”
Published 2014
Get full text
Thesis -
754by Abbas, Nidaa Hasan“... and fragile attacks. The results demonstrated that the performance of the scheme remains at par or only...”
Published 2017
Get full text
Thesis -
755
-
756
-
757by Alharbi, Talal Nasser Saud“... of potential attacks. The main reason to fail in many assessment information security awareness...”
Published 2018
Get full text
Thesis -
758by Faiezah, Abdullah.“... attacked by any biological degradation agents such as fungi, insects and marine borers. There are several...”
Published 2009
Get full text
Thesis -
759by Salem, Mohammed Ahmed“... the characteristics of the physical wireless channel to prevent the eavesdropper interruptions and attacks. The use...”
Published 2020
Thesis -
760by Syifak Izhar, Hisham“..., chaotic mixing algorithm to recover the attacked image....”
Published 2016
Get full text
Thesis