Showing 801 - 820 results of 1,198 for search '"Attacker"', query time: 0.05s Refine Results
  1. 801
    by Sadat, Shehu
    Published 2022
    ... are the activities Boko Haram insurgency, armed banditry and violence attacks from the insurgent. Furthermore...
    Get full text
    Thesis
  2. 802
    by Jamil, Matarul
    Published 2023
    ... attack problem on reinforced concrete (RC) structures settled under XS3 class exposure by utilising fly...
    Get full text
    Get full text
    Get full text
    Thesis
  3. 803
    by Ismail, Najiahtul Syafiqah
    Published 2022
    ... attack. Therefore, this research aimed to improve permission-based detection by integrating permission...
    Get full text
    Get full text
    Thesis
  4. 804
    by Gan, Eng Hong
    Published 2010
    ..., change the data on the tag, physical damage and denial-of service attacks. Recommendations...
    Get full text
    Get full text
    Thesis
  5. 805
    by Muhamad Saifulbakri, Yusoof
    Published 2021
    ... the terrorist attack in Lahad Datu, the disappearance of MH370, MAF outdated and dysfunctional logistics...
    Get full text
    Get full text
    Get full text
    Thesis
  6. 806
  7. 807
    by Samsudin, Nur Zulaikha
    Published 2014
    ... the September 11 attack Cargo crime includes hijacking, warehouse theft, lost in transit and many more...
    Get full text
    Thesis
  8. 808
    by Mohd Aminnur Hakim Sabtu
    Published 2017
    ..., midfielder, right and left winger, attacking midfielder and striker. There are 32 football characteristic...
    Get full text
    Thesis
  9. 809
    by Yusoff, Maryam Jamielah
    Published 2015
    ... to development of T2D through modification of immune response products dosage that exert attacks on host cell...
    Get full text
    Thesis
  10. 810
    by Miskon, Muhammad Izuan
    Published 2020
    ... speed, v in the range of 20 m s -1 to 40 m s -1 and the angle of attack, a in the range of 0° to 20...
    Get full text
    Thesis
  11. 811
    by Thabit, Reema Ahmed Abdalla
    Published 2022
    ... text steganography to protect against visual and statistical attack issues....
    Get full text
    Thesis
  12. 812
    by Safaei, Mahmood
    Published 2019
    ... factors such as noise, weak received signal strength or intrusion attacks. The process of detecting highly...
    Get full text
    Thesis
  13. 813
    ... that the proposed scheme has the ability to detect the location of tampering accurately for attacks of insertion...
    Get full text
    Thesis
  14. 814
    by Lai, Hoong Chuin
    Published 2018
    ... at various angles of attack ranging from 0°to 45°with intervals of 5°, with both flow Reynolds numbers...
    Get full text
    Thesis
  15. 815
    by Ahmad, Fatimah Shafinaz
    Published 2021
    ... to the possibility of being attacked or harmed, either physically or emotionally. Environmental vulnerability as a...
    Get full text
    Thesis
  16. 816
    by Mohd Yusof, Nor Azeala
    Published 2021
    ... to be vulnerable to any type of attack. Many algorithms such as AES, LED, KTANTAN, KATAN, L-Block, SIMON, SPECK...
    Get full text
    Thesis
  17. 817
    by Gana, Modu Lawan
    Published 2019
    ... both in terms of attack frequencies and fatalities rate in communities. This study therefore...
    Get full text
    Thesis
  18. 818
    by Abubakar, Saidu Isah
    Published 2018
    ..., k, ks, and zs. Furthermore, this research work develops four successful cryptanalysis attacks...
    Get full text
    Thesis
  19. 819
    by Hoe, Pik Kheng
    Published 2010
    ... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...
    Get full text
    Thesis
  20. 820
    by Hoe, Pik Kheng
    Published 2010
    ... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...
    Get full text
    Thesis