Search alternatives:
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
sheets » sheet (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
sheets » sheet (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
-
201
Discovery of reversing enzymes for RNA ADP-ribosylation reveals a possible defence module against toxic attack
Published 2025Journal article -
202
Land reclamation - from conventional vertical drain methods to a combined vacuum preloading and electro-osmosis with horizontal drainage enhanced geotextile sheets
Published 2023“…In order to reduce the time to consolidate the clay slurry, vacuum preloading with horizontal drainage enhanced geotextile (HDeG) sheets is proposed. In contrast with the previous studies reported in the literature, the test plan proposed in this study allows a systematic investigation on the effect of the configuration of HDeG in accelerating the consolidation of clay slurry. …”
Get full text
Thesis-Master by Research -
203
Self-assembling TiO2 nanorods on large graphene oxide sheets at a two-phase interface and their anti-recombination in photocatalytic applications
Published 2011“…TiO 2 nanorods are self-assembled on the graphene oxide (GO) sheets at the water/toluene interface. The self-assembled GO–TiO 2 nanorod composites (GO–TiO 2 NRCs) can be dispersed in water. …”
Get full text
Get full text
Journal Article -
204
EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs /
Published 2023“…This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. …”
Get full text
Get full text
software, multimedia -
205
Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
Published 2017“…However, there are possible ways an attacker can break the security offered by TLS, one of which is a cipher suite downgrade attack, which can take the form of a FREAK attack or a Logjam, both discovered in 2015, wherein a man in the middle can force the client and the server to use a weaker cipher suite which can be broken, thus allowing the attacker access to the communication between the client and the server. …”
Get full text
Final Year Project (FYP) -
206
Examining the role of family, media, peers in young Caucasian men’s understandings of body dissatisfaction: a thematic analysis using the tripartite influential model and social comparison theory
Published 2024“…It focuses on family, peers, and media influences, addressing a gap in the literature that rarely integrates men’s experiences. …”
Get full text
Get full text
Article -
207
-
208
-
209
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers
Published 2018“…We present the first practically realizable sidechannel assisted fault attack on PRESENT, that can retrieve the last round key efficiently using single nibble faults. …”
Get full text
Get full text
Conference Paper -
210
A finer-grain analysis of the leakage (non) resilience of OCB
Published 2023Subjects: Get full text
Journal Article -
211
-
212
Linking framing analysis and international news communication: a content analysis of newspaper coverage on the Sept. 11 attacks, Bali bombing and Madrid train bombing
Published 2008“…The aim of this cross-national study is two-fold: first, to examine framing techniques by determining which news frames (e.g. threat to economy or political climate) were dominant during each attack; and second, to integrate possible factors influencing international news flow (e.g. trade volume and geographic distance) to the theory of framing analysis. …”
Get full text
Final Year Project (FYP) -
213
-
214
Security enhancements for autonomous vehicle communication networks
Published 2024Subjects: Get full text
Thesis-Master by Research -
215
HVS-inspired adversarial image generation with high perceptual quality
Published 2023Subjects: Get full text
Journal Article -
216
Spoofing detection from a feature representation perspective
Published 2018Subjects: Get full text
Get full text
Conference Paper -
217
Empirical studies on director shareholdings of SGX-listed companies.
Published 2008Get full text
Final Year Project (FYP) -
218
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
Published 2022Subjects: “…Profiled Side-Channel Attacks…”
Get full text
Journal Article -
219
A formal methodology for verifying side-channel vulnerabilities in cache architectures
Published 2023Subjects: Get full text
Conference Paper -
220
Fully automated differential fault analysis on software implementations of block ciphers
Published 2020Subjects: Get full text
Journal Article