Search alternatives:
ceers » cheers (Expand Search), beers (Expand Search), cers (Expand Search)
shears » shear (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
ceers » cheers (Expand Search), beers (Expand Search), cers (Expand Search)
shears » shear (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
-
121
Detecting unfair ratings attacks in online rating systems
Published 2013“…Often, these rating systems are susceptible to malicious attacks which mislead the consumers. This report aims to evaluate the effectiveness of 2 defence models namely the Bayesian Reputation System (BRS) and the Integrated Clustering Based Approach known as iClub against common sighted attacks such as Constant, Camouflage, Sybil, Whitewashing and various combined attacks over several key performance metrics.…”
Get full text
Final Year Project (FYP) -
122
Attacking stressed klebsiella pneumonia biofilm with Wi-Fi
Published 2017Get full text
Final Year Project (FYP) -
123
Security enhancements to prevent DNS cache poisoning attacks
Published 2018“…One of it is DNS Cache Poisoning where attackers forcefully gain access to the names server and change the cache record, diverting users to malicious websites meant to steal confidential information for financial gain or ill-intent. …”
Get full text
Final Year Project (FYP) -
124
Advanced code reuse attacks against modern defences
Published 2019“…Exploit development is an arm race between attackers and defenders. In this thesis, I will introduce the development of code reuse attacks in recent years together with control flow integrity (CFI). …”
Get full text
Get full text
Thesis -
125
Measuring the security of computer vision systems to adversarial attacks
Published 2022“…We highlight four potential attacks to computer vision systems, these either leverage the adversarial examples phenomenon in neural networks or exploit the low-level dynamics of how scenes are captured by digital cameras.…”
Thesis -
126
Damage detection in bent plates using shear horizontal guided waves
Published 2017Subjects: “…Shear horizontal mode…”
Get full text
Get full text
Journal Article -
127
Double-spiral hexagonal boron nitride and shear strained coalescence boundary
Published 2020“…This study unveils the double-spiral growth of 2D h-BN multilayers and the creation of a shear strain band at the coalescence boundary of two h-BN spiral clusters.…”
Get full text
Journal Article -
128
Shear-flow characteristics of rock fractures and implications for injection-induced seismicity
Published 2020“…The fluid pressure front lags behind the slip front and shear stress transfer front during the aseismic slip. …”
Get full text
Thesis-Doctor of Philosophy -
129
Punching shear strength of concrete slab with various corroded reinforcing bar
Published 2021“…The study found that corrosion ratio correlated to the decrease of ultimate load and shear stress and change of the crack pattern and deflection progression of the reinforced concrete slab. …”
Get full text
Final Year Project (FYP) -
130
Rapidly yawing spheroids in viscous shear flow: emergent loss of symmetry
Published 2025“…We investigate the emergent three-dimensional (3D) dynamics of a rapidly yawing spheroidal swimmer interacting with a viscous shear flow. We show that the rapid yawing generates non axisymmetric emergent effects, with the active swimmer behaving as an effective passive particle with two orthogonal planes of symmetry. …”
Journal article -
131
Attack detection for cyber-physical systems: a zonotopic approach
Published 2023“…Two approaches, namely, projection and polytopic conversion, are presented to check the intersection situation. The detection performance is quantified using a stealthy attack set and the corresponding state estimation error set. …”
Get full text
Journal Article -
132
Attack on nigerian college : Boko Haram’s War on western education?
Published 2014“…The attack on students of an agricultural college in northeastern Nigeria by the militant Boko Haram underscores the group's violent strategy against western education. …”
Get full text
Get full text
Commentary -
133
Analysis of improved side-channel attack on AES-128 with masking
Published 2020“…An improvement to counter masking techniques is a second order attack, which performs the attack on 2 separate points in the power trace. …”
Get full text
Final Year Project (FYP) -
134
Security of automatic guided vehicles in industrial environment : attack and countermeasures
Published 2020“…This dissertation focuses on replay attack in the Industrial IoT field. The goal is to develop an active detection scheme to detect replay attacks against the Automated Guided Vehicles (AGVs). …”
Get full text
Thesis-Master by Coursework -
135
On the robustness of complex systems with multipartitivity structures under node attacks
Published 2020“…This paper fills this research gap by theoretically examining the robustness of multipartite networks under random or target node attacks. The generic percolation theory for robustness analysis of multipartite networks is accordingly put forward. …”
Get full text
Journal Article -
136
One-class knowledge distillation for face presentation attack detection
Published 2023Subjects: Get full text
Journal Article -
137
Post-quantum attacks against symmetric-key cryptography systems
Published 2024Subjects: Get full text
Thesis-Doctor of Philosophy -
138
Improved meet-in-the-middle Nostradamus attacks on AES-like hashing
Published 2024Subjects: Get full text
Journal Article -
139
Investigation of protection of DNS servers from cache poisoning attacks
Published 2012“…It performs the translation between domain name and real IP address. DNS cache poisoning attack change or insert records in the resolver caches so that a DNS query will return a fake IP address of the attacker’s domain instead of the real IP address. …”
Get full text
Final Year Project (FYP) -
140
Machine learning attack on hardware implementation of one-way function
Published 2017“…However, recent research shows that one of the most popular type of PUF, Arbiter PUF, is prone to mathematical modelling attack. Machine Learning (ML) based modelling attacks are the currently most relevant and effective attack form for PUF. …”
Get full text
Final Year Project (FYP)