Showing 61 - 80 results of 6,331 for search '((((hackers OR trackers) OR checks) OR ceres) OR peer)', query time: 0.12s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64
  5. 65

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  6. 66

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  7. 67

    Hybrid sensor fusion for unmanned ground vehicle by Guan, Mingyang

    Published 2020
    “…As expected, the proposed two trackers indeed improve the accuracy and robustness compared to the state-of-the-art trackers. …”
    Get full text
    Thesis-Doctor of Philosophy
  8. 68

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article
  9. 69

    Surrounding-aware correlation filter for UAV tracking with selective spatial regularization by Fu, Changhong, Xiong, Weijiang, Lin, Fuling, Yue, Yufeng

    Published 2022
    “…In this paper, a surrounding-aware tracker with selective spatial regularization (SASR) is presented. …”
    Get full text
    Journal Article
  10. 70

    Sowing the seeds of love: Ovid's Sementivae (Fasti 1.655-704) by Armstrong, RM

    Published 2024
    “…Meanwhile, he also modifies and subtly reconfigures the relationship between Ceres and Tellus in a manner not found in either of his dominant poetic influences. …”
    Book section
  11. 71

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  12. 72

    Deep learning network for NAO robot applications by Leong, Jing Kai

    Published 2020
    “…With the addition of deep learning to eye trackers, it is possible for the device to understand the user’s habits and improve the prediction of the output. …”
    Get full text
    Final Year Project (FYP)
  13. 73

    A Multi-satellite Perspective on “Hot Tower” Characteristics in the Equatorial Trough Zone by Pilewskie, J, Stephens, G, Takahashi, H, L’Ecuyer, T

    Published 2024
    “…Cloud vertical profiles from CloudSat and CALIPSO measurements supply convective core diameters and proxies for intensity and convective activity, and these proxies are augmented with brightness temperature data from geostationary satellite observations, precipitation information from IMERG, and cloud radiative properties from CERES. Less than 35% of all deep cores are classified as hot towers, and we estimate that 800–1700 hot towers occur at any given time over the course of a day, with the mean maximum core and hot tower frequency occurring at the time of year when peak convective intensity and precipitation occur. …”
    Journal article
  14. 74

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  15. 75

    Automatic retrieval of visual continuity errors in movies by Pickup, L, Zisserman, A

    Published 2009
    “…<p>Continuity errors occur in many movies and television series, in spite of careful checking by those employed to minimise them. In this work we develop a scheme for automatically detecting these errors and producing a ranked list of the most likely inconsistencies, working from a commercial DVD release. …”
    Conference item
  16. 76

    Tournaments of financial analysts by Yin, Huifang, Zhang, Huai

    Published 2013
    “…This finding survives several robustness checks and is more pronounced when the interim assessment date is closer to the end of the tournament period, when analysts are inexperienced, and when the market activity is high. …”
    Get full text
    Get full text
    Journal Article
  17. 77

    Can good ESG performance help companies resist external shocks? by Yang, Xin, Sheikh Hassan, Ahmad Fahmi, Karbhari, Yusuf

    Published 2024
    “…Our results remain robust even after a series of rigorous robustness checks.…”
    Get full text
    Article
  18. 78

    Evaluating geospatial accuracy for equity analyses: a case study of the U.S. National Bridge Inventory by Gandy, CA, Kang, X, Ritsch, N, Armanios, DE

    Published 2023
    “…Phase 3 assesses the feasibility of enhancing location granularity through a hand-checked case study. We find that for coarser geospatial levels (state and county), equity-based analyses may be possible, but for more granular geospatial levels (place and census tract), which is where equity-based analyses are often conducted, the data may need greater buffering and hand checks to ensure accuracy. …”
    Journal article
  19. 79

    Predicting bank failures : a comparison of the Cox proportional hazards model and time-varying covariates model. by Cheng, Philip Yim Kwong.

    Published 2008
    “…As a contribution to bank regulation by improving the accuracy of predicting failed banks, I first illustrate the use of martingale and other residuals as diagnostic checks for Cox’s proportional hazards model. Second, I discuss and substantiate the claim that a time-varying covariates model is superior to the Cox model as a bank failure model.…”
    Get full text
    Thesis
  20. 80

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)