Showing 2,841 - 2,860 results of 33,363 for search 'AT*', query time: 0.09s Refine Results
  1. 2841
    by Bojnord, Hoda Soltanian
    Published 2013
    .... VANET security is essential because a badly designed VANET is vulnerable to network attacks...
    Get full text
    Thesis
  2. 2842
  3. 2843
  4. 2844
    by Abdul Wahid, Rahmat
    Published 2014
    .... In this research, LIBS technique was used for elemental analysis of rice. Conventional atomic absorption...
    Thesis
  5. 2845
  6. 2846
    by Araghi, Tanya Koohpayeh
    Published 2013
    ... important issue for developing mobile ad hoc networks (MANETs). They expose to various kinds of attacks...
    Get full text
    Thesis
  7. 2847
  8. 2848
    ... have attracted a great deal of attention over the years. The wormhole attack can affect the performance...
    Get full text
    Thesis
  9. 2849
    by Farahmandian, Sara
    Published 2013
    ... the availability of cloud resources comes from Distributed Denial-of Service (DDoS) attack. This kind of attack...
    Get full text
    Thesis
  10. 2850
    by Hosseini, Seyed Mostafa Mir
    Published 2013
    ... is going to explore integrity attacks in RFID systems. Even though the previous related works have...
    Get full text
    Thesis
  11. 2851
  12. 2852
    by Nagalingam, Vanisri
    Published 2014
    ... online banking to online meeting. There are many types of online attacks and one of the famous online...
    Thesis
  13. 2853
    by Arifin Rusli, Mohd. Qamarul
    Published 2014
    ...The increasing of atmospheric electric field (AEF) in between the swarm and the earth ground have...
    Get full text
    Thesis
  14. 2854
  15. 2855
    by Hassan, Hasrina
    Published 2009
    ... path rain attenuation using Synthetic storm Technique. In this project, a few important parameters...
    Get full text
    Thesis
  16. 2856
  17. 2857
  18. 2858
  19. 2859
  20. 2860