Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
861
-
862
-
863
-
864by Mohd. Zamry, Nurfazrina“... inaccurate and unreliable data such as malicious attack, harsh environment as well as sensor node failure...”
Published 2022
Get full text
Thesis -
865by Elbadawy, Ismail Mohamed Ibrahim Bayoumy“... asthma attacks. Detecting asthma based on the non-stationary capnogram signal remains an open research...”
Published 2023
Get full text
Thesis -
866by Chin, Zi Hau“... to fluctuation of hash rate caused by miners leaving or entering the network such as an attack or sudden events...”
Published 2021
Thesis -
867by Khoh, Wee How“.... On the other hand, system robustness is also investigated against two common forgery attacks, (1) random...”
Published 2021
Thesis -
868
Get full text
Get full text
Get full text
Thesis -
869by Mokhtar, Hamizah“... that has capability to resist chemical attack and high thermal stability. Silica can be extracted from...”
Published 2018
Get full text
Thesis -
870“... surface due to the acid attack. Oxygen containing functional groups, mainly, carboxylic group (COOH) has...”
Get full text
Get full text
Thesis -
871Analyses of cement composites with the addition of quarry dust as partial sand replacement materials
Get full text
Get full text
Thesis -
872by Howida AbuBaker, Al-Kaaf“... by attackers to threaten user privacy. Consequently, exploring the patterns of those permissions becomes...”
Published 2022
Get full text
Thesis -
873by Anwar, Raja Waseem“... and inclusion of malicious node led to internal network attacks hence providing the reliable delivery of data...”
Published 2022
Get full text
Thesis -
874by Taha, Mustafa Sabah“... against the statistical, X2 , Histogram and non-structural steganalysis detection attacks. The obtained...”
Published 2020
Get full text
Thesis -
875by Abrahim, Araz Rajab“... the impact of blurring shallow depth, homogenous area, and noise attacks to improve the accuracy. Therefore...”
Published 2019
Get full text
Thesis -
876by Sharfah Ratibah, Tuan Mat“..., current technologies indicate that Android malware attackers have find novel ways to avoid detection...”
Published 2022
Get full text
Thesis -
877by Mohd Akhir, Muhammad Fitri“...Recently, El Nino heatwave phenomena has attacked Malaysia and consequently, the water level...”
Published 2019
Get full text
Thesis -
878by Gracia, Samuel Merryisha Sweety“... angle of attack operating at 30 m/s and Reynolds number of 4.4x105 are considered. The present study...”
Published 2020
Get full text
Thesis -
879Revisiting trauma and redemption through death drive among female suicide bombers in selected novelsby Abdullah, Amalia Qistina Castaneda“...), Yasmina Khadra’s The Attack (2007), Thomas Lee Howell’s Martyr (2015), and Gabriella Ambrosio’s...”
Published 2019
Get full text
Thesis -
880by Md Piji, Mohd Al Akmarul Fizree“... losses, including drought conditions or susceptibility to pest and pathogen attacks. The steady...”
Published 2021
Get full text
Thesis