Search alternatives:
beens » been (Expand Search), teens (Expand Search), beans (Expand Search)
shears » shear (Expand Search)
chee » chen (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
beens » been (Expand Search), teens (Expand Search), beans (Expand Search)
shears » shear (Expand Search)
chee » chen (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
-
121
Analysis of improved side-channel attack on AES-128 with masking
Published 2020“…An improvement to counter masking techniques is a second order attack, which performs the attack on 2 separate points in the power trace. …”
Get full text
Final Year Project (FYP) -
122
Security of automatic guided vehicles in industrial environment : attack and countermeasures
Published 2020“…This dissertation focuses on replay attack in the Industrial IoT field. The goal is to develop an active detection scheme to detect replay attacks against the Automated Guided Vehicles (AGVs). …”
Get full text
Thesis-Master by Coursework -
123
Post-quantum attacks against symmetric-key cryptography systems
Published 2024Subjects: Get full text
Thesis-Doctor of Philosophy -
124
Improved meet-in-the-middle Nostradamus attacks on AES-like hashing
Published 2024Subjects: Get full text
Journal Article -
125
Machine learning attack on hardware implementation of one-way function
Published 2017“…However, recent research shows that one of the most popular type of PUF, Arbiter PUF, is prone to mathematical modelling attack. Machine Learning (ML) based modelling attacks are the currently most relevant and effective attack form for PUF. …”
Get full text
Final Year Project (FYP) -
126
Recovering trade after a terrorist attack: the APEC way
Published 2016“…Most counter-terrorism measures taken after 9-11 seek to prevent a terrorist attack. None have looked at how the US and its trading partners will recover from a terrorist attack. …”
Get full text
Get full text
Commentary -
127
Synthesis of code-reuse attacks from p-code programs
Published 2025“…We present a new method for automatically synthesizing code-reuse attacks—for example, using Return Oriented Programming—based on mechanized formal logic. …”
Conference item -
128
Exploring integrity of AEADs with faults: definitions and constructions
Published 2023Subjects: Get full text
Journal Article -
129
Exploring EFL teachers’ perceptions of the use of peer assessment in external exam-dominated writing classes
Published 2022“…Several studies on peer assessment (PA) have highlighted significant benefits for the learning process such as increased student motivation, enhanced collaborative learning (especially in terms of EFL writing) and improved reflection skills. …”
Get full text
Article -
130
Exploring the acceptance of mobile-assisted peer feedback in English speaking among Chinese EFL students
Published 2024“…Grounded in the Technology Acceptance Model (TAM), this quasi-experimental study examined the use of Mobile-Assisted Peer Feedback (MAPF) tools via the Tencent Mini Programme among Chinese university EFL learners to enhance English speaking proficiency. …”
Get full text
Article -
131
Shear Capacity of RC Beam with Opening Strengthened Using CFRP Sheet and Plate
Published 2024“…This study aims to compare the maximal shear capacity of each CFRP configuration to that of conventional beams and evaluate the deflection profiles, failure modes, strain distribution, and crack patterns under shear loads. …”
Get full text
Article -
132
Shear behaviour of steel members and beam-to-column joints under elevated temperatures
Published 2008“…In this study, the beam web shear component of a joint has first been simplified into an equivalent girder web panel subjected to shear force. …”
Get full text
Thesis -
133
Regulation of Adenine Nucleotide Concentration at Endothelium-Fluid Interface by Viscous Shear Flow
Published 2005Subjects: Get full text
Article -
134
Tuning the shear thickening of suspensions through surface roughness and physico-chemical interactions
Published 2024“…Shear thickening denotes the reversible increase in viscosity of a suspension of rigid particles under external shear. …”
Get full text
Article -
135
Anomalous crystalline ordering of particles in a viscoelastic fluid under high shear
Published 2024“…Addition of particles to a viscoelastic suspension dramatically alters the properties of the mixture, particularly when it is sheared or otherwise processed. Shear-induced stretching of the polymers results in elastic stress that causes a substantial increase in measured viscosity with increasing shear, and an attractive interaction between particles, leading to their chaining. …”
Get full text
Article -
136
Active Vorticity Control in a Shear Flow Using a Flapping Foil
Published 2005Subjects: “…shear flow…”
Get full text
Article -
137
Effects of coarse-grained material on hydraulic properties and shear strength of top soil
Published 2011“…Sidewalk failures associated with top soil of low shear strength are a common problem in urban areas. …”
Get full text
Get full text
Journal Article -
138
The effects of shear deformation in non-rectangular steel reinforced concrete structural walls
Published 2021“…Methods for calculating the portion of shear deformation and shear lag effect in design are proposed based on a truss analogy. …”
Get full text
Journal Article -
139
Label flipping attacks in hierarchical federated learning for intrusion detection in IoT
Published 2024“…We further explore the impact of label-flipping attacks on hierarchical FL systems used in IoT-based intrusion detection. …”
Get full text
Article -
140
The effects of peer instruction through social learning environment towards students' cognitive load and learning performance /
Published 2017software, multimedia