Showing 201 - 220 results of 6,940 for search '(((beers OR sheets) OR (cheer OR ((trackers OR attackers) OR checks))) OR peer)', query time: 0.19s Refine Results
  1. 201
  2. 202

    Land reclamation - from conventional vertical drain methods to a combined vacuum preloading and electro-osmosis with horizontal drainage enhanced geotextile sheets by Wong, Lung Anthony

    Published 2023
    “…In order to reduce the time to consolidate the clay slurry, vacuum preloading with horizontal drainage enhanced geotextile (HDeG) sheets is proposed. In contrast with the previous studies reported in the literature, the test plan proposed in this study allows a systematic investigation on the effect of the configuration of HDeG in accelerating the consolidation of clay slurry. …”
    Get full text
    Thesis-Master by Research
  3. 203

    Self-assembling TiO2 nanorods on large graphene oxide sheets at a two-phase interface and their anti-recombination in photocatalytic applications by Liu, Jincheng, Bai, Hongwei, Wang, Yinjie, Liu, Zhaoyang, Zhang, Xiwang, Sun, Darren Delai

    Published 2011
    “…TiO 2 nanorods are self-assembled on the graphene oxide (GO) sheets at the water/toluene interface. The self-assembled GO–TiO 2 nanorod composites (GO–TiO 2 NRCs) can be dispersed in water. …”
    Get full text
    Get full text
    Journal Article
  4. 204

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. …”
    Get full text
    Get full text
    software, multimedia
  5. 205

    Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers by Pathangi Janardhanan Jatinshravan

    Published 2017
    “…However, there are possible ways an attacker can break the security offered by TLS, one of which is a cipher suite downgrade attack, which can take the form of a FREAK attack or a Logjam, both discovered in 2015, wherein a man in the middle can force the client and the server to use a weaker cipher suite which can be broken, thus allowing the attacker access to the communication between the client and the server. …”
    Get full text
    Final Year Project (FYP)
  6. 206
  7. 207
  8. 208
  9. 209

    One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers by Patranabis, Sikhar, Mukhopadhyay, Debdeep, Breier, Jakub, Bhasin, Shivam

    Published 2018
    “…We present the first practically realizable sidechannel assisted fault attack on PRESENT, that can retrieve the last round key efficiently using single nibble faults. …”
    Get full text
    Get full text
    Conference Paper
  10. 210
  11. 211
  12. 212

    Linking framing analysis and international news communication: a content analysis of newspaper coverage on the Sept. 11 attacks, Bali bombing and Madrid train bombing by Tan, Joann Li Hoeng, Yang, Yanni, Jamaliah Othman

    Published 2008
    “…The aim of this cross-national study is two-fold: first, to examine framing techniques by determining which news frames (e.g. threat to economy or political climate) were dominant during each attack; and second, to integrate possible factors influencing international news flow (e.g. trade volume and geographic distance) to the theory of framing analysis. …”
    Get full text
    Final Year Project (FYP)
  13. 213

    Meals matter by Feng, Yuxin

    Published 2024
    Subjects:
    Get full text
    Final Year Project (FYP)
  14. 214
  15. 215
  16. 216
  17. 217
  18. 218
  19. 219
  20. 220