Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
821by Mohd Aminnur Hakim Sabtu“..., midfielder, right and left winger, attacking midfielder and striker. There are 32 football characteristic...”
Published 2017
Get full text
Thesis -
822by Yusoff, Maryam Jamielah“... to development of T2D through modification of immune response products dosage that exert attacks on host cell...”
Published 2015
Get full text
Thesis -
823by Miskon, Muhammad Izuan“... speed, v in the range of 20 m s -1 to 40 m s -1 and the angle of attack, a in the range of 0° to 20...”
Published 2020
Get full text
Thesis -
824by Thabit, Reema Ahmed Abdalla“... text steganography to protect against visual and statistical attack issues....”
Published 2022
Get full text
Thesis -
825by Safaei, Mahmood“... factors such as noise, weak received signal strength or intrusion attacks. The process of detecting highly...”
Published 2019
Get full text
Thesis -
826by Al-Khafaji, Ali Abdulraheem Alwan“... that the proposed scheme has the ability to detect the location of tampering accurately for attacks of insertion...”
Published 2020
Get full text
Thesis -
827by Lai, Hoong Chuin“... at various angles of attack ranging from 0°to 45°with intervals of 5°, with both flow Reynolds numbers...”
Published 2018
Get full text
Thesis -
828by Ahmad, Fatimah Shafinaz“... to the possibility of being attacked or harmed, either physically or emotionally. Environmental vulnerability as a...”
Published 2021
Get full text
Thesis -
829Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusofby Mohd Yusof, Nor Azeala“... to be vulnerable to any type of attack. Many algorithms such as AES, LED, KTANTAN, KATAN, L-Block, SIMON, SPECK...”
Published 2021
Get full text
Thesis -
830by Gana, Modu Lawan“... both in terms of attack frequencies and fatalities rate in communities. This study therefore...”
Published 2019
Get full text
Thesis -
831by Abubakar, Saidu Isah“..., k, ks, and zs. Furthermore, this research work develops four successful cryptanalysis attacks...”
Published 2018
Get full text
Thesis -
832by Hoe, Pik Kheng“... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...”
Published 2010
Get full text
Thesis -
833by Hoe, Pik Kheng“... plantations on peat as it attacks the living tissues of the plants. Biological control using Metarhizium...”
Published 2010
Get full text
Thesis -
834by Wong, Woon Keong“...-storey feature with open space ground floor. Such building type is highly vulnerable to seismic attack...”
Published 2020
Get full text
Thesis -
835by Rafieizonooz, Mahdi“... exhibited good influence in terms of resistance to chemical attacks than the control specimen. On the other...”
Published 2017
Get full text
Thesis -
836by Idris, Amidora“... better 3D visualization during seizure attacks. Finally, two major applications of the technique...”
Published 2012
Thesis -
837by Brohi, Sarfraz Nawaz“... and integrity concerns. Malicious attackers have violated the cloud storages to steal, view, manipulate...”
Published 2015
Get full text
Thesis -
838by Yusof, Yusnita“... (MDI) technique and information about the identification and control of asthma attacks...”
Published 2006
Get full text
Thesis -
839by Farsidilla Basuki, Febbie“.... Recent increase in terrorist attacks gave governments the momentum to use „war on terror‟ validations...”
Published 2015
Get full text
Thesis -
840by Tey, Sheik Kyin“... of currency crisis and supports the first-generation model of speculative attacks; (5) the responses...”
Published 2018
Get full text
Thesis