Showing 41 - 60 results of 8,155 for search '(((ceers OR sheers) OR (cheer OR ((trackers OR attackers) OR checks))) OR been)', query time: 0.22s Refine Results
  1. 41

    2020 Jolo suicide attack : evolving tactics by Yeo, Kenneth, Mahzam, Remy

    Published 2020
    “…The 24 August 2020 suicide bombing in Jolo which involved female attackers has brought attention to the emergence of the pro-Islamic State (IS) Hatib Hajan Sawadjaan faction of the Abu Sayyaf Group and its tactic of engaging women for this role.…”
    Get full text
    Commentary
  2. 42

    Protecting neural networks from adversarial attacks by Yeow, Zhong Han

    Published 2024
    “…This project investigates how Searchable Symmetric Encryption (SSE) can be applied to neural networks as a form of protection from adversarial attacks and the viability of such an implementation. …”
    Get full text
    Final Year Project (FYP)
  3. 43

    Collusion attacks for digital fingerprinting of image and video by Wahadaniah, Viktor

    Published 2008
    “…In this thesis, three existing linear and non-linear collusion attacks on image/video fingerprinting, namely averaging collusion attack, maximum-minimum collusion attack, and Stone's zero-correlation collusion attack, are studied and analysed. …”
    Get full text
    Thesis
  4. 44
  5. 45

    Co-resident attacks on public cloud infrastructures by Vu, Duc Long

    Published 2019
    “…This report proposes a novel virtual machine (VM) placement technique called "Grouped Instance" in response to the rise of co-location side-channel attack in public cloud infrastructure. This is a simple yet effective algorithm, of which origin is to limit the spreading area of malicious users by restricting the VM placement area of a user into a small group of users. …”
    Get full text
    Final Year Project (FYP)
  6. 46

    Islamic State's first terror attack in Malaysia by Gunaratna, Rohan

    Published 2016
    “…The ideological influence of the Islamic State is spreading rapidly in Southeast Asia. The terrorist attack in Selangor, Malaysia demonstrates that the threat is growing.…”
    Get full text
    Get full text
    Commentary
  7. 47

    Kabul Suicide Attack: Growing IS Factor in Afghanistan by Rathore, Shahzeb Ali, Mahmood, Sara

    Published 2016
    “…The suicide attack in Kabul by Islamic State’s local franchise, Wilayat Khurasan, underscores the group’s operational capability. …”
    Get full text
    Get full text
    Commentary
  8. 48

    Konfrontasi: why Singapore was in forefront of Indonesian attacks by Mushahid Ali

    Published 2016
    “…Indonesia’s confrontation of Malaysia in the 1960s saw a campaign of bomb attacks against civilian targets in Singapore including MacDonald House. …”
    Get full text
    Get full text
    Commentary
  9. 49
  10. 50

    Generating unfair ratings to attack online rating systems by Dang, Nguyen Anh Khoa

    Published 2012
    “…To encounter attacks to maliciously manipulate those systems, many trust model researches have been in strong development. …”
    Get full text
    Final Year Project (FYP)
  11. 51

    Security enhancements to prevent DNS cache poisoning attacks by Chong, Soon Seng

    Published 2018
    “…DNSSEC has been introduced as a solution to DNS Cache Poisoning but has not been very popular with the internet community. …”
    Get full text
    Final Year Project (FYP)
  12. 52

    Practical attribute reconstruction attack against federated learning by Chen, Chen, Lyu, Lingjuan, Yu, Han, Chen, Gang

    Published 2024
    “…Existing federated learning (FL) designs have been shown to exhibit vulnerabilities which can be exploited by adversaries to compromise data privacy. …”
    Get full text
    Journal Article
  13. 53

    Advanced code reuse attacks against modern defences by Wang, Chenyu

    Published 2019
    “…Exploit development is an arm race between attackers and defenders. In this thesis, I will introduce the development of code reuse attacks in recent years together with control flow integrity (CFI). …”
    Get full text
    Get full text
    Thesis
  14. 54

    Certifiers make neural networks vulnerable to availability attacks by Lorenz, T, Kwiatkowska, M, Fritz, M

    Published 2023
    “…Certifiers for neural networks are a reliable way to check the robustness of these predictions. They guarantee for some predictions that a certain class of manipulations or attacks could not have changed the outcome. …”
    Conference item
  15. 55

    The Pulwama Attack’s After Effects : Fake News and Rumours by Mohammed Sinan Siyech

    Published 2019
    “…The terrorist attack in Kashmir which resulted in the death of more than 40 members of the Central Reserve Police Force (CRPF) has generated fresh tensions between India and Pakistan. …”
    Get full text
    Get full text
    Commentary
  16. 56

    Advanced attack and defense techniques in machine learning systems by Zhao, Mengchen

    Published 2019
    “…Second, we consider attackers who make sequential attack plans based on the outcome of previous attacks. …”
    Get full text
    Get full text
    Thesis
  17. 57
  18. 58

    The impact of Israel's attacks on Iran's foreign and defence policies by Dzulhisham, Huzeir Ezekiel

    Published 2024
    “…The failure of Iran’s strategy of forward defence, as shown in its inability to fend off the Israeli attacks, may compel Iran to acquire a nuclear arsenal earlier. …”
    Get full text
    Commentary
  19. 59

    Detecting unfair ratings attacks in online rating systems by Ho, Wenxu.

    Published 2013
    “…Often, these rating systems are susceptible to malicious attacks which mislead the consumers. This report aims to evaluate the effectiveness of 2 defence models namely the Bayesian Reputation System (BRS) and the Integrated Clustering Based Approach known as iClub against common sighted attacks such as Constant, Camouflage, Sybil, Whitewashing and various combined attacks over several key performance metrics.…”
    Get full text
    Final Year Project (FYP)
  20. 60