Showing 121 - 140 results of 7,019 for search '(((ceers OR shears) OR (cheer OR ((trackers OR attackers) OR checks))) OR peer)', query time: 0.24s Refine Results
  1. 121

    Attack on nigerian college : Boko Haram’s War on western education? by Ahmed Salah Hashim

    Published 2014
    “…The attack on students of an agricultural college in northeastern Nigeria by the militant Boko Haram underscores the group's violent strategy against western education. …”
    Get full text
    Get full text
    Commentary
  2. 122

    Analysis of improved side-channel attack on AES-128 with masking by Tee, Yee Yang

    Published 2020
    “…An improvement to counter masking techniques is a second order attack, which performs the attack on 2 separate points in the power trace. …”
    Get full text
    Final Year Project (FYP)
  3. 123

    Security of automatic guided vehicles in industrial environment : attack and countermeasures by Xie, Minxin

    Published 2020
    “…This dissertation focuses on replay attack in the Industrial IoT field. The goal is to develop an active detection scheme to detect replay attacks against the Automated Guided Vehicles (AGVs). …”
    Get full text
    Thesis-Master by Coursework
  4. 124

    On the robustness of complex systems with multipartitivity structures under node attacks by Cai, Qing, Alam, Sameer, Liu, Jiming

    Published 2020
    “…This paper fills this research gap by theoretically examining the robustness of multipartite networks under random or target node attacks. The generic percolation theory for robustness analysis of multipartite networks is accordingly put forward. …”
    Get full text
    Journal Article
  5. 125
  6. 126
  7. 127
  8. 128

    Investigation of protection of DNS servers from cache poisoning attacks by Liu, Haochen.

    Published 2012
    “…It performs the translation between domain name and real IP address. DNS cache poisoning attack change or insert records in the resolver caches so that a DNS query will return a fake IP address of the attacker’s domain instead of the real IP address. …”
    Get full text
    Final Year Project (FYP)
  9. 129

    Machine learning attack on hardware implementation of one-way function by Lauw, Andri Renardi

    Published 2017
    “…However, recent research shows that one of the most popular type of PUF, Arbiter PUF, is prone to mathematical modelling attack. Machine Learning (ML) based modelling attacks are the currently most relevant and effective attack form for PUF. …”
    Get full text
    Final Year Project (FYP)
  10. 130

    Side channel attack on mobile devices using machine learning by Muhammad Jazeel Meerasah

    Published 2019
    “…Firstly , existing side channel attacks methods that are implemented on a smartphone are discussed . …”
    Get full text
    Final Year Project (FYP)
  11. 131

    Recovering trade after a terrorist attack: the APEC way by Ho, Joshua

    Published 2016
    “…Most counter-terrorism measures taken after 9-11 seek to prevent a terrorist attack. None have looked at how the US and its trading partners will recover from a terrorist attack. …”
    Get full text
    Get full text
    Commentary
  12. 132

    Synthesis of code-reuse attacks from p-code programs by Melham, TF, DenHoed, M

    Published 2025
    “…We present a new method for automatically synthesizing code-reuse attacks—for example, using Return Oriented Programming—based on mechanized formal logic. …”
    Conference item
  13. 133
  14. 134

    Exploring EFL teachers’ perceptions of the use of peer assessment in external exam-dominated writing classes by Meletiadou, Eleni, Tsagari, Dina

    Published 2022
    “…Several studies on peer assessment (PA) have highlighted significant benefits for the learning process such as increased student motivation, enhanced collaborative learning (especially in terms of EFL writing) and improved reflection skills. …”
    Get full text
    Article
  15. 135

    Exploring the acceptance of mobile-assisted peer feedback in English speaking among Chinese EFL students by Weng, Jiayang, Noordin, Nooreen, Ahmad, Norhakimah Khaiessa

    Published 2024
    “…Grounded in the Technology Acceptance Model (TAM), this quasi-experimental study examined the use of Mobile-Assisted Peer Feedback (MAPF) tools via the Tencent Mini Programme among Chinese university EFL learners to enhance English speaking proficiency. …”
    Get full text
    Article
  16. 136

    Shear Capacity of RC Beam with Opening Strengthened Using CFRP Sheet and Plate by Fai, Moi Kin, Ali, Noorwirdawati

    Published 2024
    “…This study aims to compare the maximal shear capacity of each CFRP configuration to that of conventional beams and evaluate the deflection profiles, failure modes, strain distribution, and crack patterns under shear loads. …”
    Get full text
    Article
  17. 137

    Anomalous crystalline ordering of particles in a viscoelastic fluid under high shear by Sun, Sijie, Xue, Nan, Aime, Stefano, Kim, Hyoungsoo, Tang, Jizhou, McKinley, Gareth H., Stone, Howard A., Weitz, David A.

    Published 2024
    “…Addition of particles to a viscoelastic suspension dramatically alters the properties of the mixture, particularly when it is sheared or otherwise processed. Shear-induced stretching of the polymers results in elastic stress that causes a substantial increase in measured viscosity with increasing shear, and an attractive interaction between particles, leading to their chaining. …”
    Get full text
    Article
  18. 138

    Tuning the shear thickening of suspensions through surface roughness and physico-chemical interactions by Bourrianne, Philippe, Niggel, Vincent, Polly, Gatien, Divoux, Thibaut, McKinley, Gareth H.

    Published 2024
    “…Shear thickening denotes the reversible increase in viscosity of a suspension of rigid particles under external shear. …”
    Get full text
    Article
  19. 139
  20. 140