Search alternatives:
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
sheers » sheets (Expand Search), sheer (Expand Search), shears (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
sheers » sheets (Expand Search), sheer (Expand Search), shears (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
-
121
Streamlined security framework for defence against XSS attacks targeted at HTML5
Published 2012“…This report presents a server-client collaborative framework for detecting and preventing cross-site attacks and thus assisting for the development of XSS-free web applications based on HTML5. …”
Get full text
Final Year Project (FYP) -
122
Detection of false data injection attacks in smart grid cyber-physical systems
Published 2019“…Accordingly, FDI attacks can be subdivided into false measurement data injection (FmDI) attacks and false command data injection (FcDI) attacks, respectively. …”
Get full text
Get full text
Thesis -
123
Does the peer review mode make a difference? An exploratory look at undergraduates' performances and preferences in a writing course
Published 2024“…The importance of peer review practice in writing courses has been strongly supported by pedagogical research. …”
Get full text
Journal Article -
124
Do you know what I'm thinking about? Examining children's mental states understanding in conversations with peers.
Published 2010“…Participants’ conversations with peers were observed and transcribed for references to mental states. …”
Get full text
Final Year Project (FYP) -
125
The Use of Co-Worker Peer-Review as an Alternative Assessment in Leadership Courses to Evaluate Student’s Leadership Qualities (S/O 14756)
Published 2021“…This research investigated the effect of peer-assessment in the classroom also known as student peer-assessment, and peer-assessment at the workplace or co-worker peer-assessment on postgraduate students’ leadership skills. …”
Get full text
Monograph -
126
Analysis and identification of distributed denial of service attacks using intra-domain messaging schemes
Published 2024“…This research discusses security systems against Distributed Denial-of-Service (DDoS) attacks. The focus of domestic co-operation research is the resolution and identification of DDoS attacks using the Intra-Domain Messaging (I-DM) method. …”
Get full text
Conference or Workshop Item -
127
Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection
Published 2018“…As a prominent attack approach against the security modules of integrated circuits, fault injection attacks (FIA) are able to breach thecryptographic primitives by analyzing the intentionally induced computation errors by adversaries. …”
Get full text
Get full text
Journal Article -
128
Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks
Published 2024“…Attackers can restrict the output representations (the values of output neurons) of trigger-embedded samples to arbitrary predefined values through additional training, namely neuron-level backdoor attack (NeuBA). …”
Get full text
Article -
129
Generation, Detection, and Evaluation of Role-play based Jailbreak attacks in Large Language Models
Published 2024“…Companies such as OpenAI employ manual tactics like red-teaming in order to enhance a LLM’s robustness against these attacks, however these tactics may fail to defend against all role-play based jailbreak attacks due to their potentially limited ability to predict unseen attacks. …”
Get full text
Thesis -
130
Stealthy and robust glitch injection attack on deep learning accelerator for target with variational viewpoint
Published 2021“…In this paper, we propose a new glitch injection attack on DNN accelerator that is capable of misclassifying a target under variational viewpoints. …”
Get full text
Journal Article -
131
DAPA : Differential Analysis Aided Power Attack on (non-) linear feedback shift registers
Published 2021“…In this work, we generalise their methodology and combine with differential analysis, we called it differential analysis aided power attack (DAPA), to uncover more bit relations and take into account the linear or non-linear functions that feedback to the shift registers (i.e. …”
Get full text
Journal Article -
132
Distributed control for voltage and current sharing islanded DC microgrids under cyber attacks
Published 2021“…As a cyber-physical system (CPD), a microgrid (MG) is threatened by various cyber-attacks. To ensure the security of MGs under these attacks, suitable control method must be designed to enhance the security of MG. …”
Get full text
Final Year Project (FYP) -
133
Cyber attacks and their impacts on the shipping industry : identify the risks and suggest ways to mitigate (port)
Published 2021“…Besides the benefits of being more digitalized and connected, this transformation has also created a new ecosystem where cyber-attack poses as the top risk in port that result in catastrophic consequences. …”
Get full text
Final Year Project (FYP) -
134
Universal adversarial network attacks on traffic light recognition of Apollo autonomous driving system
Published 2022“…A black-box Universal Adversarial Network (UAN) is first trained to create a universal perturbation, which will be used to attack the machine learning model that recognises traffic light signals. …”
Get full text
Final Year Project (FYP) -
135
Secure cooperative event-triggered control of linear multiagent systems under DoS attacks
Published 2022“…This paper studies secure cooperative event-triggered control of linear multiagent systems under denial-of-service (DoS) attacks. The DoS attacks refer to interruptions of communication channels carried out by an intelligent adversary. …”
Get full text
Journal Article -
136
Security protocol design against malicious attacks in neighborhood area network in smart grid
Published 2016“…However, the new protocol still has the vital problem when it is faced with the DoS attack and replay attack. In this project, I analyzes the threats and attacks in wireless mesh network together with the improved 4-way handshake protocol. …”
Get full text
Thesis -
137
SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers
Published 2018“…SCADPA is a chosen-plaintext attack, knowledge of the ciphertext is not required. …”
Get full text
Get full text
Conference Paper -
138
Assault and battery: evaluating the security of power conversion systems against electromagnetic injection attacks
Published 2024“…We develop a novel multifrequency IEMI attack technique to effectively target devices with multiple sensors. …”
Conference item -
139
When mobile phone use becomes problematic : the influence of self, parents and peers on adolescents' mobile phone behavior in Singapore and Malaysia
Published 2018“…The second and third parts of this dissertation investigate the effects of adolescents’ personalities (such as self-esteem, extraversion, neuroticism, and self-control), parental influence (such as parental mobile phone use, parenting styles, and parental mediation), and peer influence (such as peer mediation, peer norms, and peer capital) on both mobile phone use and problematic mobile phone use among adolescents in Singapore and Malaysia. …”
Get full text
Thesis -
140
Cyber Security @ Higher Education – Developing a Preventive Model for Cyber Attack (S/O 13598)
Published 2019“…Cyber-attacks have increased significantly in the 21st centuries. …”
Get full text
Monograph