Search alternatives:
pbphone » payphone (Expand Search)
bhoney » honey (Expand Search), bhone (Expand Search), boney (Expand Search)
donkey » monkey (Expand Search), conkey (Expand Search), doney (Expand Search)
hong » long (Expand Search), kong (Expand Search)
boon » book (Expand Search)
pbphone » payphone (Expand Search)
bhoney » honey (Expand Search), bhone (Expand Search), boney (Expand Search)
donkey » monkey (Expand Search), conkey (Expand Search), doney (Expand Search)
hong » long (Expand Search), kong (Expand Search)
boon » book (Expand Search)
-
121
-
122
-
123
Network steganography – an investigation of covert channels in network protocols
Published 2011Get full text
Final Year Project (FYP) -
124
-
125
-
126
-
127
-
128
-
129
-
130
-
131
-
132
Numerical studies of electric double layer effect through microchannel flows
Published 2008Get full text
Thesis -
133
-
134
A tablet computer app for renewable energy engineering calculations
Published 2016Get full text
Final Year Project (FYP) -
135
Development of a multi-rotor UAV : structural material & key component analysis
Published 2018Get full text
Final Year Project (FYP) -
136
Security enhancements to prevent DNS cache poisoning attacks
Published 2018Get full text
Final Year Project (FYP) -
137
-
138
Automatic PoC generation for Android app vulnerability
Published 2021“…Vulnerabilities in mobile applications are becoming more and more common in this fast-paced world where almost everyone possesses a mobile phone. Therefore, using various static analysis tools for scanning of mobile applications helps in identifying potential security vulnerabilities that are hidden within applications. …”
Get full text
Final Year Project (FYP) -
139
Teaching lab asset inventory management system
Published 2024Get full text
Final Year Project (FYP) -
140
Investment opportunities in the tourism industry of South Africa.
Published 2008Get full text
Final Year Project (FYP)