Suggested Topics within your search.
Suggested Topics within your search.
Security measures
15
September 11 Terrorist Attacks, 2001
10
Computer networks
9
Computer security
8
Terrorism
8
Dissertations
7
Dissertations, Academic
7
Access control
6
Cryptography
6
Influence
6
Islam
6
Data encryption (Computer science)
5
Data protection
5
Computers
4
History
4
Politics and government
4
Prevention
4
Quantum theory
4
Religious aspects
4
Foreign relations
3
Muslims
3
Passwords
3
Quantum communication
3
Aerodynamics
2
Airplanes
2
Algorithms
2
Arabs
2
Design and construction
2
Digital images
2
Digital techniques
2
-
1
-
2
-
3
-
4
-
5
-
6by Chan, Kah Wai“...The concrete structures subject to aggressive environment under sulphate attack is of key...”
Published 2021
Get full text
Thesis -
7by Mohd. Ghazzali, Amalina“...This study of web worms attack on web application can be implemented to enhance the security...”
Published 2008
Get full text
Thesis -
8
-
9
-
10
-
11by Haron, Haliza“... to the attackers. This study will focus on jamming attack and the case study has been done at Kolej Komuniti Masjid...”
Published 2015
Get full text
Get full text
Thesis -
12by Ahmad Baidowi, Zaid Mujaiyid Putra“...Plaintext Recovery Attack is a new attack in security system world. It was discovered lately...”
Published 2010
Get full text
Thesis -
13by Sanaei, Mojtaba Ghanaatpisheh“..., selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One...”
Published 2013
Get full text
Thesis -
14by Khan, Muhammad Murad“... In The Middle can observe key exchange messages and can setup MITM attack between communication. Security...”
Published 2013
Get full text
Thesis -
15by Siew, Hong Wei“...The main aims of this study are divided into, firstly, a generic model of crosstalk attack and its...”
Published 2013
Thesis -
16
-
17by Alahmadi, Ahmed Mohammed A.“... to achieve these vital features the Bitcoin system should be provably secure against the attacks. Many...”
Published 2018
Get full text
Thesis -
18by Mohd Jaafar, Fatin Haziqah“...This study is about termite attack at historical building, where it is involves a conservation work...”
Published 2013
Get full text
Thesis -
19by Abdelgader, Abdelrahman Abdelgader Altigani“...Static cyphers use static transformations for encryption and decryption. Therefore, the attacker...”
Published 2022
Get full text
Thesis -
20by Apandi, Mohamad Aiman Hanif“...In the wireless network, there is an attack called Wormhole attack that capable in confusing...”
Published 2019
Get full text
Thesis