Showing 861 - 880 results of 1,221 for search '"Attacker"', query time: 0.05s Refine Results
  1. 861
    by Khan, Burhan Ul Islam
    Published 2014
    Get full text
    Thesis
  2. 862
    by Su, Wai Mon
    Published 2018
    Get full text
    Thesis
  3. 863
  4. 864
    by Mohd. Zamry, Nurfazrina
    Published 2022
    ... inaccurate and unreliable data such as malicious attack, harsh environment as well as sensor node failure...
    Get full text
    Thesis
  5. 865
    ... asthma attacks. Detecting asthma based on the non-stationary capnogram signal remains an open research...
    Get full text
    Thesis
  6. 866
    by Chin, Zi Hau
    Published 2021
    ... to fluctuation of hash rate caused by miners leaving or entering the network such as an attack or sudden events...
    Thesis
  7. 867
    by Khoh, Wee How
    Published 2021
    .... On the other hand, system robustness is also investigated against two common forgery attacks, (1) random...
    Thesis
  8. 868
    ..., and modulus of elasticity. These tests are to be investigated under the effect of salt attack . Furthermore...
    Get full text
    Get full text
    Get full text
    Thesis
  9. 869
    by Mokhtar, Hamizah
    Published 2018
    ... that has capability to resist chemical attack and high thermal stability. Silica can be extracted from...
    Get full text
    Thesis
  10. 870
    ... surface due to the acid attack. Oxygen containing functional groups, mainly, carboxylic group (COOH) has...
    Get full text
    Get full text
    Thesis
  11. 871
    ... to sulphate attack with the addition of 12.5 wt.% and 17.5 wt.% of the quarry dust....
    Get full text
    Get full text
    Thesis
  12. 872
    by Howida AbuBaker, Al-Kaaf
    Published 2022
    ... by attackers to threaten user privacy. Consequently, exploring the patterns of those permissions becomes...
    Get full text
    Thesis
  13. 873
    by Anwar, Raja Waseem
    Published 2022
    ... and inclusion of malicious node led to internal network attacks hence providing the reliable delivery of data...
    Get full text
    Thesis
  14. 874
    by Taha, Mustafa Sabah
    Published 2020
    ... against the statistical, X2 , Histogram and non-structural steganalysis detection attacks. The obtained...
    Get full text
    Thesis
  15. 875
    by Abrahim, Araz Rajab
    Published 2019
    ... the impact of blurring shallow depth, homogenous area, and noise attacks to improve the accuracy. Therefore...
    Get full text
    Thesis
  16. 876
    by Sharfah Ratibah, Tuan Mat
    Published 2022
    ..., current technologies indicate that Android malware attackers have find novel ways to avoid detection...
    Get full text
    Thesis
  17. 877
    by Mohd Akhir, Muhammad Fitri
    Published 2019
    ...Recently, El Nino heatwave phenomena has attacked Malaysia and consequently, the water level...
    Get full text
    Thesis
  18. 878
    ... angle of attack operating at 30 m/s and Reynolds number of 4.4x105 are considered. The present study...
    Get full text
    Thesis
  19. 879
    ...), Yasmina Khadra’s The Attack (2007), Thomas Lee Howell’s Martyr (2015), and Gabriella Ambrosio’s...
    Get full text
    Thesis
  20. 880
    ... losses, including drought conditions or susceptibility to pest and pathogen attacks. The steady...
    Get full text
    Thesis