Search alternatives:
ceers » cheers (Expand Search), peers (Expand Search), cers (Expand Search)
beers » peers (Expand Search), bears (Expand Search), bees (Expand Search), beens (Expand Search)
sheers » sheets (Expand Search), sheer (Expand Search), shears (Expand Search)
chee » chen (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
ceers » cheers (Expand Search), peers (Expand Search), cers (Expand Search)
beers » peers (Expand Search), bears (Expand Search), bees (Expand Search), beens (Expand Search)
sheers » sheets (Expand Search), sheer (Expand Search), shears (Expand Search)
chee » chen (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
beer » been (Expand Search), peer (Expand Search), bee (Expand Search)
-
41
Investigation on effective solutions against insider attacks
Published 2018Get full text
Final Year Project (FYP) -
42
Co-resident attacks on public cloud infrastructures
Published 2019“…This report proposes a novel virtual machine (VM) placement technique called "Grouped Instance" in response to the rise of co-location side-channel attack in public cloud infrastructure. This is a simple yet effective algorithm, of which origin is to limit the spreading area of malicious users by restricting the VM placement area of a user into a small group of users. …”
Get full text
Final Year Project (FYP) -
43
The Stabbing of Wiranto : Growing Trend of Knife Attacks
Published 2019“…The incident highlights the continuation of the knife attack trend among terrorists and the militant threat arising from Indonesian pro-IS family units.…”
Get full text
Get full text
Commentary -
44
Islamic State's first terror attack in Malaysia
Published 2016“…The ideological influence of the Islamic State is spreading rapidly in Southeast Asia. The terrorist attack in Selangor, Malaysia demonstrates that the threat is growing.…”
Get full text
Get full text
Commentary -
45
Kabul Suicide Attack: Growing IS Factor in Afghanistan
Published 2016“…The suicide attack in Kabul by Islamic State’s local franchise, Wilayat Khurasan, underscores the group’s operational capability. …”
Get full text
Get full text
Commentary -
46
Konfrontasi: why Singapore was in forefront of Indonesian attacks
Published 2016“…Indonesia’s confrontation of Malaysia in the 1960s saw a campaign of bomb attacks against civilian targets in Singapore including MacDonald House. …”
Get full text
Get full text
Commentary -
47
Assessing the Islamic State’s commitment to attacking the West
Published 2015“…This article looks at what IS has said and done with regard to attacks in the West. We examine IS statements and take stock of IS-related attack plots in Western Europe, North America, and Australia from January 2011 through June 2015 using a new dataset of jihadi plots and a new typology of links between organizations and attackers. …”
Journal article -
48
The impact of repeated notifications and notification checking mode on investors' reactions to managers’ strategic positive title emphasis
Published 2023Subjects: Get full text
Journal Article -
49
Certifiers make neural networks vulnerable to availability attacks
Published 2023“…Certifiers for neural networks are a reliable way to check the robustness of these predictions. They guarantee for some predictions that a certain class of manipulations or attacks could not have changed the outcome. …”
Conference item -
50
The Pulwama Attack’s After Effects : Fake News and Rumours
Published 2019“…The terrorist attack in Kashmir which resulted in the death of more than 40 members of the Central Reserve Police Force (CRPF) has generated fresh tensions between India and Pakistan. …”
Get full text
Get full text
Commentary -
51
Advanced attack and defense techniques in machine learning systems
Published 2019“…Second, we consider attackers who make sequential attack plans based on the outcome of previous attacks. …”
Get full text
Get full text
Thesis -
52
BadSFL: backdoor attack in scaffold federated learning
Published 2024Subjects: Get full text
Final Year Project (FYP) -
53
Practical attribute reconstruction attack against federated learning
Published 2024“…However, most current works conduct attacks by leveraging gradients calculated on a small batch of data. …”
Get full text
Journal Article -
54
The impact of Israel's attacks on Iran's foreign and defence policies
Published 2024“…The failure of Iran’s strategy of forward defence, as shown in its inability to fend off the Israeli attacks, may compel Iran to acquire a nuclear arsenal earlier. …”
Get full text
Commentary -
55
Generating unfair ratings to attack online rating systems
Published 2012“…Many online rating systems have been developed to provide its users a point of reference when deciding which counter party they should choose to transact with. To encounter attacks to maliciously manipulate those systems, many trust model researches have been in strong development. …”
Get full text
Final Year Project (FYP) -
56
Detecting unfair ratings attacks in online rating systems
Published 2013“…Often, these rating systems are susceptible to malicious attacks which mislead the consumers. This report aims to evaluate the effectiveness of 2 defence models namely the Bayesian Reputation System (BRS) and the Integrated Clustering Based Approach known as iClub against common sighted attacks such as Constant, Camouflage, Sybil, Whitewashing and various combined attacks over several key performance metrics.…”
Get full text
Final Year Project (FYP) -
57
Attacking stressed klebsiella pneumonia biofilm with Wi-Fi
Published 2017Get full text
Final Year Project (FYP) -
58
Security enhancements to prevent DNS cache poisoning attacks
Published 2018“…One of it is DNS Cache Poisoning where attackers forcefully gain access to the names server and change the cache record, diverting users to malicious websites meant to steal confidential information for financial gain or ill-intent. …”
Get full text
Final Year Project (FYP) -
59
Advanced code reuse attacks against modern defences
Published 2019“…Exploit development is an arm race between attackers and defenders. In this thesis, I will introduce the development of code reuse attacks in recent years together with control flow integrity (CFI). …”
Get full text
Get full text
Thesis -
60
Measuring the security of computer vision systems to adversarial attacks
Published 2022“…We highlight four potential attacks to computer vision systems, these either leverage the adversarial examples phenomenon in neural networks or exploit the low-level dynamics of how scenes are captured by digital cameras.…”
Thesis