Showing 741 - 760 results of 1,221 for search '"Attacker"', query time: 0.04s Refine Results
  1. 741
    ... too much with angle of attack and also not much pressure losses at the time, the airflow entering...
    Get full text
    Get full text
    Get full text
    Thesis
  2. 742
    by Najiahtul Syafiqah, Ismail
    Published 2013
    ... diagram of DroidKungFu1 and generate attack pattern of DroidKungFu1. This result will help future...
    Get full text
    Get full text
    Thesis
  3. 743
  4. 744
  5. 745
  6. 746
    by Amirulikhsan, Zolkafli
    Published 2008
    ... communication in spreading their ideologies and attack plans by hiding malicious materials in digital images via...
    Get full text
    Get full text
    Thesis
  7. 747
    by Suryanti, Awang
    Published 2015
    ... to the ability to avoid spoof attack since it is difficult for impostor to imitate two different characteristics...
    Get full text
    Thesis
  8. 748
    by Ahmad, Asma Hana
    Published 2003
    ... struggle of an unfortunate victim due to cruel environment; and finally, Jude the Obscure (1895) attacks...
    Get full text
    Thesis
  9. 749
    by Thamarakshan, Shalima
    Published 2015
    ... of bullying are divided into six forms, namely work-related bullying, personal attacks, social isolation...
    Get full text
    Get full text
    Thesis
  10. 750
    by Ibrahim, Mimi Dalina
    Published 2016
    ... used internet widely. However, the number of attack, suspicious event and vulnerabilities in internet...
    Get full text
    Get full text
    Thesis
  11. 751
    by H. Belgassem, Seddeq
    Published 2004
    .... The Science of cryptography provides one means to combat these attacks. These include encryption, decryption...
    Get full text
    Thesis
  12. 752
    by Malallah, Fahad Layth
    Published 2014
    ..., online signature biometric requires the use of template database which is vulnerable to attacks...
    Get full text
    Thesis
  13. 753
    by Abd Aziz, Norazah
    Published 2014
    ... the security goals. Analysis on TLS+MA protocol shows that it is resistant against replay and collusion attacks...
    Get full text
    Thesis
  14. 754
  15. 755
  16. 756
    by Alshammari, Mohammad Matar
    Published 2018
    Get full text
    Thesis
  17. 757
    by Alharbi, Talal Nasser Saud
    Published 2018
    ... of potential attacks. The main reason to fail in many assessment information security awareness...
    Get full text
    Thesis
  18. 758
    by Faiezah, Abdullah.
    Published 2009
    ... attacked by any biological degradation agents such as fungi, insects and marine borers. There are several...
    Get full text
    Thesis
  19. 759
    by Salem, Mohammed Ahmed
    Published 2020
    ... the characteristics of the physical wireless channel to prevent the eavesdropper interruptions and attacks. The use...
    Thesis
  20. 760
    by Syifak Izhar, Hisham
    Published 2016
    ..., chaotic mixing algorithm to recover the attacked image....
    Get full text
    Thesis