Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
801by Sadat, Shehu“... are the activities Boko Haram insurgency, armed banditry and violence attacks from the insurgent. Furthermore...”
Published 2022
Get full text
Thesis -
802by Jamil, Matarul“... attack problem on reinforced concrete (RC) structures settled under XS3 class exposure by utilising fly...”
Published 2023
Get full text
Get full text
Get full text
Thesis -
803by Ismail, Najiahtul Syafiqah“... attack. Therefore, this research aimed to improve permission-based detection by integrating permission...”
Published 2022
Get full text
Get full text
Thesis -
804by Gan, Eng Hong“..., change the data on the tag, physical damage and denial-of service attacks. Recommendations...”
Published 2010
Get full text
Get full text
Thesis -
805by Muhamad Saifulbakri, Yusoof“... the terrorist attack in Lahad Datu, the disappearance of MH370, MAF outdated and dysfunctional logistics...”
Published 2021
Get full text
Get full text
Get full text
Thesis -
806
-
807by Samsudin, Nur Zulaikha“... the September 11 attack Cargo crime includes hijacking, warehouse theft, lost in transit and many more...”
Published 2014
Get full text
Thesis -
808by Mohd Aminnur Hakim Sabtu“..., midfielder, right and left winger, attacking midfielder and striker. There are 32 football characteristic...”
Published 2017
Get full text
Thesis -
809by Yusoff, Maryam Jamielah“... to development of T2D through modification of immune response products dosage that exert attacks on host cell...”
Published 2015
Get full text
Thesis -
810by Miskon, Muhammad Izuan“... speed, v in the range of 20 m s -1 to 40 m s -1 and the angle of attack, a in the range of 0° to 20...”
Published 2020
Get full text
Thesis -
811by Thabit, Reema Ahmed Abdalla“... text steganography to protect against visual and statistical attack issues....”
Published 2022
Get full text
Thesis -
812by Safaei, Mahmood“... factors such as noise, weak received signal strength or intrusion attacks. The process of detecting highly...”
Published 2019
Get full text
Thesis -
813by Al-Khafaji, Ali Abdulraheem Alwan“... that the proposed scheme has the ability to detect the location of tampering accurately for attacks of insertion...”
Published 2020
Get full text
Thesis -
814by Lai, Hoong Chuin“... at various angles of attack ranging from 0°to 45°with intervals of 5°, with both flow Reynolds numbers...”
Published 2018
Get full text
Thesis -
815by Ahmad, Fatimah Shafinaz“... to the possibility of being attacked or harmed, either physically or emotionally. Environmental vulnerability as a...”
Published 2021
Get full text
Thesis -
816Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusofby Mohd Yusof, Nor Azeala“... to be vulnerable to any type of attack. Many algorithms such as AES, LED, KTANTAN, KATAN, L-Block, SIMON, SPECK...”
Published 2021
Get full text
Thesis -
817by Gana, Modu Lawan“... both in terms of attack frequencies and fatalities rate in communities. This study therefore...”
Published 2019
Get full text
Thesis -
818by Abubakar, Saidu Isah“..., k, ks, and zs. Furthermore, this research work develops four successful cryptanalysis attacks...”
Published 2018
Get full text
Thesis -
819by Hoe, Pik Kheng“... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...”
Published 2010
Get full text
Thesis -
820by Hoe, Pik Kheng“... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...”
Published 2010
Get full text
Thesis