Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
921
-
922
-
923
-
924
-
925by Zainal Abidin, Nur Qamarina“... such as electrical stress, biological attack, and outdoor weathering contamination. Leakage Current (LC) is one...”
Published 2015
Get full text
Get full text
Thesis -
926by Abdullah, Muhammad Daniel Hafiz“..., information collected using recommendations are vulnerable to dishonest recommendation attacks that can...”
Published 2018
Get full text
Thesis -
927by Mohd Pozi, Muhammad Syafiq“... performance on detecting anomalous rare attacks from network intrusion data set. The SVGPM performance...”
Published 2016
Get full text
Thesis -
928by Yakubu, Safiya“... of both ligninolytic and non-ligninolytic type of enzymes with major attack on the Kregion (C-9 and C-10...”
Published 2014
Get full text
Thesis -
929
-
930by Pang, Wei Ming“... lesson on Distributed Denial of service (DDoS) attack, e-learning designers can affix facial expressions...”
Published 2022
Thesis -
931
Get full text
Get full text
Get full text
Thesis -
932by Nurhidayah, Mahazam“... making it sensitive to microbial attack and affecting the SWCCs established. In this study, the physical...”
Published 2017
Get full text
Thesis -
933by Shavarebi, Kamran“... to access the durability performance of SSA concrete, resistance to carbonation, sulphate attack and gas...”
Published 2016
Get full text
Thesis -
934by Mohammed Saleh, Mohammed Ahmed“... against the modem security attacks and eavesdropping. Furthermore, those methods have become impractical...”
Published 2016
Get full text
Thesis -
935by Nik Omar, Nik Azmi“... of MyKad. This thesis therefore proposed a new MyKad Testing Strategy model for logical attacks...”
Published 2006
Get full text
Thesis -
936by Saiful Annur, Muhamad Safiq“...= -5.394,/? < 0.05), attackers (Z= -3,280, p < 0.05) and also the midfielders (Z= -3.823,p< 0.05...”
Published 2013
Get full text
Thesis -
937by Muhammad Rizal, Muhammad Asyraf“... to degrade and fail after 20 years of service due to creep, natural wood defect and attack from natural...”
Published 2021
Get full text
Thesis -
938by Mat Saman, Norhafezaidi“... to PD attacked up to 1.04 p,m. Meanwhile, the same formulation of XLPE nanocomposites also indicated...”
Published 2022
Get full text
Thesis -
939by Mohd Hanafi, Hashim“... containing 10% of unground POFA achieve higher durability against acid and sulphate attack compare...”
Published 2020
Get full text
Thesis -
940by Ahmed, Hussam Alddin Shihab“... certain known and potential cryptanalytic attacks. Hence, research in this area has increased since...”
Published 2019
Get full text
Thesis