Showing 121 - 140 results of 8,560 for search '((((ceers OR peers) OR shears) OR ((cher OR chen) OR ((trackers OR attackers) OR checks))) OR peer)', query time: 0.25s Refine Results
  1. 121

    The impact of Israel's attacks on Iran's foreign and defence policies by Dzulhisham, Huzeir Ezekiel

    Published 2024
    “…The failure of Iran’s strategy of forward defence, as shown in its inability to fend off the Israeli attacks, may compel Iran to acquire a nuclear arsenal earlier. …”
    Get full text
    Commentary
  2. 122

    Generating unfair ratings to attack online rating systems by Dang, Nguyen Anh Khoa

    Published 2012
    “…Many online rating systems have been developed to provide its users a point of reference when deciding which counter party they should choose to transact with. To encounter attacks to maliciously manipulate those systems, many trust model researches have been in strong development. …”
    Get full text
    Final Year Project (FYP)
  3. 123

    Detecting unfair ratings attacks in online rating systems by Ho, Wenxu.

    Published 2013
    “…Often, these rating systems are susceptible to malicious attacks which mislead the consumers. This report aims to evaluate the effectiveness of 2 defence models namely the Bayesian Reputation System (BRS) and the Integrated Clustering Based Approach known as iClub against common sighted attacks such as Constant, Camouflage, Sybil, Whitewashing and various combined attacks over several key performance metrics.…”
    Get full text
    Final Year Project (FYP)
  4. 124
  5. 125

    Security enhancements to prevent DNS cache poisoning attacks by Chong, Soon Seng

    Published 2018
    “…One of it is DNS Cache Poisoning where attackers forcefully gain access to the names server and change the cache record, diverting users to malicious websites meant to steal confidential information for financial gain or ill-intent. …”
    Get full text
    Final Year Project (FYP)
  6. 126

    Advanced code reuse attacks against modern defences by Wang, Chenyu

    Published 2019
    “…Exploit development is an arm race between attackers and defenders. In this thesis, I will introduce the development of code reuse attacks in recent years together with control flow integrity (CFI). …”
    Get full text
    Get full text
    Thesis
  7. 127

    Measuring the security of computer vision systems to adversarial attacks by Lovisotto, G

    Published 2022
    “…We highlight four potential attacks to computer vision systems, these either leverage the adversarial examples phenomenon in neural networks or exploit the low-level dynamics of how scenes are captured by digital cameras.…”
    Thesis
  8. 128
  9. 129

    Double-spiral hexagonal boron nitride and shear strained coalescence boundary by Park, Hyo Ju, Tay, Roland Yingjie, Wang, Xiao, Zhao, Wen, Kim, Jung Hwa, Ruoff, Rodney S., Ding, Feng, Teo, Edwin Hang Tong, Lee, Zonghoon

    Published 2020
    “…This study unveils the double-spiral growth of 2D h-BN multilayers and the creation of a shear strain band at the coalescence boundary of two h-BN spiral clusters.…”
    Get full text
    Journal Article
  10. 130

    Shear-flow characteristics of rock fractures and implications for injection-induced seismicity by Ji, Yinlin

    Published 2020
    “…The fluid pressure front lags behind the slip front and shear stress transfer front during the aseismic slip. …”
    Get full text
    Thesis-Doctor of Philosophy
  11. 131

    Punching shear strength of concrete slab with various corroded reinforcing bar by Liwanto, Richie

    Published 2021
    “…The study found that corrosion ratio correlated to the decrease of ultimate load and shear stress and change of the crack pattern and deflection progression of the reinforced concrete slab. …”
    Get full text
    Final Year Project (FYP)
  12. 132

    Rapidly yawing spheroids in viscous shear flow: emergent loss of symmetry by Dalwadi, M

    Published 2025
    “…We investigate the emergent three-dimensional (3D) dynamics of a rapidly yawing spheroidal swimmer interacting with a viscous shear flow. We show that the rapid yawing generates non axisymmetric emergent effects, with the active swimmer behaving as an effective passive particle with two orthogonal planes of symmetry. …”
    Journal article
  13. 133

    Attack detection for cyber-physical systems: a zonotopic approach by Li, Jitao, Wang, Zhenhua, Shen, Yi, Xie, Lihua

    Published 2023
    “…Two approaches, namely, projection and polytopic conversion, are presented to check the intersection situation. The detection performance is quantified using a stealthy attack set and the corresponding state estimation error set. …”
    Get full text
    Journal Article
  14. 134

    苏伟贞《沉默之岛》的身体书写与现代性 = On embodied modernities in Su Wei-Chen’s island of silence by 陈文慧 Tan, Boon Hui

    Published 2014
    “…This thesis is an analysis on Su Wei-Chen’s novel Island of Silence (1994), with regards to the theme of embodied modernities. …”
    Get full text
    Final Year Project (FYP)
  15. 135

    Attack on nigerian college : Boko Haram’s War on western education? by Ahmed Salah Hashim

    Published 2014
    “…The attack on students of an agricultural college in northeastern Nigeria by the militant Boko Haram underscores the group's violent strategy against western education. …”
    Get full text
    Get full text
    Commentary
  16. 136

    Analysis of improved side-channel attack on AES-128 with masking by Tee, Yee Yang

    Published 2020
    “…An improvement to counter masking techniques is a second order attack, which performs the attack on 2 separate points in the power trace. …”
    Get full text
    Final Year Project (FYP)
  17. 137

    Security of automatic guided vehicles in industrial environment : attack and countermeasures by Xie, Minxin

    Published 2020
    “…This dissertation focuses on replay attack in the Industrial IoT field. The goal is to develop an active detection scheme to detect replay attacks against the Automated Guided Vehicles (AGVs). …”
    Get full text
    Thesis-Master by Coursework
  18. 138

    On the robustness of complex systems with multipartitivity structures under node attacks by Cai, Qing, Alam, Sameer, Liu, Jiming

    Published 2020
    “…This paper fills this research gap by theoretically examining the robustness of multipartite networks under random or target node attacks. The generic percolation theory for robustness analysis of multipartite networks is accordingly put forward. …”
    Get full text
    Journal Article
  19. 139
  20. 140