Showing 841 - 860 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 841
    by Hariri, Azian
    Published 2009
    ... was statically stable with trimmed angle of attack of approximately 0.18 degree. Through mathematical model...
    Get full text
    Get full text
    Get full text
    Thesis
  2. 842
    by Mahalingam, Sheila
    Published 2017
    ...-malicious attacks. This approach can guide on what can be done to improve learners’ participation...
    Get full text
    Get full text
    Thesis
  3. 843
  4. 844
  5. 845
  6. 846
  7. 847
  8. 848
    by Elsharif, Tarig Elsayed Ali
    Published 2003
    ... attacked by the fungus Fusarium oxysporum Schlect. fsp. cubense (E.F.Smith) Snyder and Hansen (FOC...
    Get full text
    Thesis
  9. 849
    by Ab Raub, Rosmawati
    Published 2010
    ... of September 11, 2001 attacks on The World Trade Center in the United States. E-mail traffic, disease...
    Get full text
    Thesis
  10. 850
    by Moh. Usman, Nurhadi
    Published 2002
    ... of survey indicated that CTV was found to attack citrus varieties such as C. grandis, C. aurantifolia, C...
    Get full text
    Thesis
  11. 851
  12. 852
  13. 853
    by Way, Chiang Poh
    Published 2006
    ... response to fungal attack. This response has been hypothesized to play an important role in determining...
    Get full text
    Thesis
  14. 854
    by Lim, Kean Jin
    Published 2006
    ... fungal attack did not involve individual gene. Additionally, many clones encoding proteins with unknown...
    Get full text
    Thesis
  15. 855
    by Abkooh, Elaheh Taheri
    Published 2016
    ... is the sixth most susceptible country in the world to cyber-risks, in the form of malware attacks via computer...
    Get full text
    Thesis
  16. 856
    by Zaini, Lukmanul Hakim
    Published 2013
    ... and bleached fibres because of the acid attacked the crystalline region. Thermogravimetric analysis (TGA...
    Get full text
    Thesis
  17. 857
    by Torshizi, Seyed Dawood Sajjadi
    Published 2013
    ..., in the existence of any malicious activity such as UDP food or DoS (Denial of Service) attacks by mesh stations...
    Get full text
    Thesis
  18. 858
    by Yusoff, Sofia Hayati
    Published 2014
    ...In portraying Islam especially after the September 11 attacks, a number of studies found...
    Get full text
    Thesis
  19. 859
    by Zakaria, Nur Hafiza
    Published 2016
    ... in cryptanalysis using branch number in estimating the possible success of differential and linear attacks. Based...
    Get full text
    Thesis
  20. 860
    by Rayung, Marwah
    Published 2014
    ... susceptible to microbial attacked, therefore the addition of fiber helps to accelerate the degradation...
    Get full text
    Thesis