Search alternatives:
ceers » cheers (Expand Search), peers (Expand Search), beers (Expand Search)
shears » shear (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
ceers » cheers (Expand Search), peers (Expand Search), beers (Expand Search)
shears » shear (Expand Search)
cheer » cheers (Expand Search), chee (Expand Search), cher (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
-
121
Attack on nigerian college : Boko Haram’s War on western education?
Published 2014“…The attack on students of an agricultural college in northeastern Nigeria by the militant Boko Haram underscores the group's violent strategy against western education. …”
Get full text
Get full text
Commentary -
122
Analysis of improved side-channel attack on AES-128 with masking
Published 2020“…An improvement to counter masking techniques is a second order attack, which performs the attack on 2 separate points in the power trace. …”
Get full text
Final Year Project (FYP) -
123
Security of automatic guided vehicles in industrial environment : attack and countermeasures
Published 2020“…This dissertation focuses on replay attack in the Industrial IoT field. The goal is to develop an active detection scheme to detect replay attacks against the Automated Guided Vehicles (AGVs). …”
Get full text
Thesis-Master by Coursework -
124
On the robustness of complex systems with multipartitivity structures under node attacks
Published 2020“…This paper fills this research gap by theoretically examining the robustness of multipartite networks under random or target node attacks. The generic percolation theory for robustness analysis of multipartite networks is accordingly put forward. …”
Get full text
Journal Article -
125
One-class knowledge distillation for face presentation attack detection
Published 2023Subjects: Get full text
Journal Article -
126
Post-quantum attacks against symmetric-key cryptography systems
Published 2024Subjects: Get full text
Thesis-Doctor of Philosophy -
127
Improved meet-in-the-middle Nostradamus attacks on AES-like hashing
Published 2024Subjects: Get full text
Journal Article -
128
Investigation of protection of DNS servers from cache poisoning attacks
Published 2012“…It performs the translation between domain name and real IP address. DNS cache poisoning attack change or insert records in the resolver caches so that a DNS query will return a fake IP address of the attacker’s domain instead of the real IP address. …”
Get full text
Final Year Project (FYP) -
129
Machine learning attack on hardware implementation of one-way function
Published 2017“…However, recent research shows that one of the most popular type of PUF, Arbiter PUF, is prone to mathematical modelling attack. Machine Learning (ML) based modelling attacks are the currently most relevant and effective attack form for PUF. …”
Get full text
Final Year Project (FYP) -
130
Side channel attack on mobile devices using machine learning
Published 2019“…Firstly , existing side channel attacks methods that are implemented on a smartphone are discussed . …”
Get full text
Final Year Project (FYP) -
131
Recovering trade after a terrorist attack: the APEC way
Published 2016“…Most counter-terrorism measures taken after 9-11 seek to prevent a terrorist attack. None have looked at how the US and its trading partners will recover from a terrorist attack. …”
Get full text
Get full text
Commentary -
132
Synthesis of code-reuse attacks from p-code programs
Published 2025“…We present a new method for automatically synthesizing code-reuse attacks—for example, using Return Oriented Programming—based on mechanized formal logic. …”
Conference item -
133
Exploring integrity of AEADs with faults: definitions and constructions
Published 2023Subjects: Get full text
Journal Article -
134
Exploring EFL teachers’ perceptions of the use of peer assessment in external exam-dominated writing classes
Published 2022“…Several studies on peer assessment (PA) have highlighted significant benefits for the learning process such as increased student motivation, enhanced collaborative learning (especially in terms of EFL writing) and improved reflection skills. …”
Get full text
Article -
135
Exploring the acceptance of mobile-assisted peer feedback in English speaking among Chinese EFL students
Published 2024“…Grounded in the Technology Acceptance Model (TAM), this quasi-experimental study examined the use of Mobile-Assisted Peer Feedback (MAPF) tools via the Tencent Mini Programme among Chinese university EFL learners to enhance English speaking proficiency. …”
Get full text
Article -
136
Shear Capacity of RC Beam with Opening Strengthened Using CFRP Sheet and Plate
Published 2024“…This study aims to compare the maximal shear capacity of each CFRP configuration to that of conventional beams and evaluate the deflection profiles, failure modes, strain distribution, and crack patterns under shear loads. …”
Get full text
Article -
137
Anomalous crystalline ordering of particles in a viscoelastic fluid under high shear
Published 2024“…Addition of particles to a viscoelastic suspension dramatically alters the properties of the mixture, particularly when it is sheared or otherwise processed. Shear-induced stretching of the polymers results in elastic stress that causes a substantial increase in measured viscosity with increasing shear, and an attractive interaction between particles, leading to their chaining. …”
Get full text
Article -
138
Tuning the shear thickening of suspensions through surface roughness and physico-chemical interactions
Published 2024“…Shear thickening denotes the reversible increase in viscosity of a suspension of rigid particles under external shear. …”
Get full text
Article -
139
Active Vorticity Control in a Shear Flow Using a Flapping Foil
Published 2005Subjects: “…shear flow…”
Get full text
Article -
140
Regulation of Adenine Nucleotide Concentration at Endothelium-Fluid Interface by Viscous Shear Flow
Published 2005Subjects: Get full text
Article