Search alternatives:
hone » phone (Expand Search), honey (Expand Search), bhone (Expand Search)
pone » one (Expand Search), done (Expand Search), pore (Expand Search)
pbbponeyy » pbboneyy (Expand Search), pbbdoneyy (Expand Search), pbbporeyy (Expand Search)
bhoone » bhone (Expand Search), boone (Expand Search), bioone (Expand Search)
hooney » honey (Expand Search), rooney (Expand Search), looney (Expand Search)
hong » long (Expand Search), kong (Expand Search)
hone » phone (Expand Search), honey (Expand Search), bhone (Expand Search)
pone » one (Expand Search), done (Expand Search), pore (Expand Search)
pbbponeyy » pbboneyy (Expand Search), pbbdoneyy (Expand Search), pbbporeyy (Expand Search)
bhoone » bhone (Expand Search), boone (Expand Search), bioone (Expand Search)
hooney » honey (Expand Search), rooney (Expand Search), looney (Expand Search)
hong » long (Expand Search), kong (Expand Search)
-
81
-
82
-
83
Network steganography – an investigation of covert channels in network protocols
Published 2011Get full text
Final Year Project (FYP) -
84
-
85
-
86
-
87
-
88
-
89
-
90
-
91
-
92
Numerical studies of electric double layer effect through microchannel flows
Published 2008Get full text
Thesis -
93
-
94
A tablet computer app for renewable energy engineering calculations
Published 2016Get full text
Final Year Project (FYP) -
95
Development of a multi-rotor UAV : structural material & key component analysis
Published 2018Get full text
Final Year Project (FYP) -
96
Security enhancements to prevent DNS cache poisoning attacks
Published 2018Get full text
Final Year Project (FYP) -
97
-
98
-
99
-
100