Showing 121 - 140 results of 6,734 for search '(((beers OR sheers) OR (cheer OR ((trackers OR attackers) OR (checks OR check)))) OR peer)', query time: 0.24s Refine Results
  1. 121

    Streamlined security framework for defence against XSS attacks targeted at HTML5 by Cheng, Chi Chung.

    Published 2012
    “…This report presents a server-client collaborative framework for detecting and preventing cross-site attacks and thus assisting for the development of XSS-free web applications based on HTML5. …”
    Get full text
    Final Year Project (FYP)
  2. 122

    Detection of false data injection attacks in smart grid cyber-physical systems by Li, Beibei

    Published 2019
    “…Accordingly, FDI attacks can be subdivided into false measurement data injection (FmDI) attacks and false command data injection (FcDI) attacks, respectively. …”
    Get full text
    Get full text
    Thesis
  3. 123

    Does the peer review mode make a difference? An exploratory look at undergraduates' performances and preferences in a writing course by Hsieh, Yi-Chin, Leong, Alvin Ping, Lin, Yu-Ju, Aryadoust, Vahid

    Published 2024
    “…The importance of peer review practice in writing courses has been strongly supported by pedagogical research. …”
    Get full text
    Journal Article
  4. 124

    Do you know what I'm thinking about? Examining children's mental states understanding in conversations with peers. by Ho, SiRong.

    Published 2010
    “…Participants’ conversations with peers were observed and transcribed for references to mental states. …”
    Get full text
    Final Year Project (FYP)
  5. 125

    The Use of Co-Worker Peer-Review as an Alternative Assessment in Leadership Courses to Evaluate Student’s Leadership Qualities (S/O 14756) by Abd Rahim, Nazahah, Ab Rahman, Faizahani

    Published 2021
    “…This research investigated the effect of peer-assessment in the classroom also known as student peer-assessment, and peer-assessment at the workplace or co-worker peer-assessment on postgraduate students’ leadership skills. …”
    Get full text
    Monograph
  6. 126

    Analysis and identification of distributed denial of service attacks using intra-domain messaging schemes by Budiyanto, Setiyo, Silalahi, Lukman Medriavin, Simanjuntak, Imelda Uli Vistalina, Rochendi, Agus Dendi, Andryana, Septi, Hamid, Abdul, Mubarak, Mochamad Ikhsan

    Published 2024
    “…This research discusses security systems against Distributed Denial-of-Service (DDoS) attacks. The focus of domestic co-operation research is the resolution and identification of DDoS attacks using the Intra-Domain Messaging (I-DM) method. …”
    Get full text
    Conference or Workshop Item
  7. 127

    Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection by Breier, Jakub, He, Wei, Jap, Dirmanto, Bhasin, Shivam, Chattopadhyay, Anupam

    Published 2018
    “…As a prominent attack approach against the security modules of integrated circuits, fault injection attacks (FIA) are able to breach thecryptographic primitives by analyzing the intentionally induced computation errors by adversaries. …”
    Get full text
    Get full text
    Journal Article
  8. 128

    Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks by Zhang, Zhengyan, Xiao, Guangxuan, Li, Yongwei, Lv, Tian, Qi, Fanchao, Liu, Zhiyuan, Wang, Yasheng, Jiang, Xin, Sun, Maosong

    Published 2024
    “…Attackers can restrict the output representations (the values of output neurons) of trigger-embedded samples to arbitrary predefined values through additional training, namely neuron-level backdoor attack (NeuBA). …”
    Get full text
    Article
  9. 129

    Generation, Detection, and Evaluation of Role-play based Jailbreak attacks in Large Language Models by Johnson, Zachary D.

    Published 2024
    “…Companies such as OpenAI employ manual tactics like red-teaming in order to enhance a LLM’s robustness against these attacks, however these tactics may fail to defend against all role-play based jailbreak attacks due to their potentially limited ability to predict unseen attacks. …”
    Get full text
    Thesis
  10. 130

    Stealthy and robust glitch injection attack on deep learning accelerator for target with variational viewpoint by Liu, Wenye, Chang, Chip-Hong, Zhang, Fan

    Published 2021
    “…In this paper, we propose a new glitch injection attack on DNN accelerator that is capable of misclassifying a target under variational viewpoints. …”
    Get full text
    Journal Article
  11. 131

    DAPA : Differential Analysis Aided Power Attack on (non-) linear feedback shift registers by Sim, Siang Meng, Jap, Dirmanto, Bhasin, Shivam

    Published 2021
    “…In this work, we generalise their methodology and combine with differential analysis, we called it differential analysis aided power attack (DAPA), to uncover more bit relations and take into account the linear or non-linear functions that feedback to the shift registers (i.e. …”
    Get full text
    Journal Article
  12. 132

    Distributed control for voltage and current sharing islanded DC microgrids under cyber attacks by Lim, Hui Jing

    Published 2021
    “…As a cyber-physical system (CPD), a microgrid (MG) is threatened by various cyber-attacks. To ensure the security of MGs under these attacks, suitable control method must be designed to enhance the security of MG. …”
    Get full text
    Final Year Project (FYP)
  13. 133

    Cyber attacks and their impacts on the shipping industry : identify the risks and suggest ways to mitigate (port) by Ye, Xin

    Published 2021
    “…Besides the benefits of being more digitalized and connected, this transformation has also created a new ecosystem where cyber-attack poses as the top risk in port that result in catastrophic consequences. …”
    Get full text
    Final Year Project (FYP)
  14. 134

    Universal adversarial network attacks on traffic light recognition of Apollo autonomous driving system by Chia, Yi You

    Published 2022
    “…A black-box Universal Adversarial Network (UAN) is first trained to create a universal perturbation, which will be used to attack the machine learning model that recognises traffic light signals. …”
    Get full text
    Final Year Project (FYP)
  15. 135

    Secure cooperative event-triggered control of linear multiagent systems under DoS attacks by Feng, Zhi, Hu, Guoqiang

    Published 2022
    “…This paper studies secure cooperative event-triggered control of linear multiagent systems under denial-of-service (DoS) attacks. The DoS attacks refer to interruptions of communication channels carried out by an intelligent adversary. …”
    Get full text
    Journal Article
  16. 136

    Security protocol design against malicious attacks in neighborhood area network in smart grid by Li, Xiaochen

    Published 2016
    “…However, the new protocol still has the vital problem when it is faced with the DoS attack and replay attack. In this project, I analyzes the threats and attacks in wireless mesh network together with the improved 4-way handshake protocol. …”
    Get full text
    Thesis
  17. 137

    SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers by Breier, Jakub, Jap, Dirmanto, Bhasin, Shivam

    Published 2018
    “…SCADPA is a chosen-plaintext attack, knowledge of the ciphertext is not required. …”
    Get full text
    Get full text
    Conference Paper
  18. 138

    Assault and battery: evaluating the security of power conversion systems against electromagnetic injection attacks by Szakály, M, Kohler, S, Strohmeier, M, Martinovic, I

    Published 2024
    “…We develop a novel multifrequency IEMI attack technique to effectively target devices with multiple sensors. …”
    Conference item
  19. 139

    When mobile phone use becomes problematic : the influence of self, parents and peers on adolescents' mobile phone behavior in Singapore and Malaysia by Chuah, Soo Fei

    Published 2018
    “…The second and third parts of this dissertation investigate the effects of adolescents’ personalities (such as self-esteem, extraversion, neuroticism, and self-control), parental influence (such as parental mobile phone use, parenting styles, and parental mediation), and peer influence (such as peer mediation, peer norms, and peer capital) on both mobile phone use and problematic mobile phone use among adolescents in Singapore and Malaysia. …”
    Get full text
    Thesis
  20. 140