Showing 321 - 340 results of 10,476 for search '(peers OR (when OR ((hackers OR ((attackers OR attacheds) OR attacker)) OR (checker OR checked))))', query time: 0.21s Refine Results
  1. 321
  2. 322
  3. 323
  4. 324
  5. 325

    PE.740 Fencing, Spring 2006 by Koniusz, Jaroslav

    Published 2006
    Subjects:
    Get full text
    Learning Object
  6. 326
  7. 327
  8. 328
  9. 329
  10. 330
  11. 331
  12. 332
  13. 333
  14. 334
  15. 335

    The Importance of Bystanders in Threat Assessment and Management by Borum, Randy, Rowe, Mary

    Published 2025
    “…They are the reason that some planned attacks are foiled before they occur. Numerous studies of targeted violence (e.g., mass shootings and school shootings), have demonstrated that peers and bystanders often have knowledge of an attacker’s intentions, concerning communication, and troubling behavior before the attack occurs. …”
    Get full text
    Book chapter
  16. 336

    Weak implementation of RSA algorithm by Lim, Si Yi

    Published 2023
    “…The objective of this project is to research on the mathematical algorithms and investigate the various weak implementation that an attacker may use to attack the RSA algorithm. For this project, the focus will be on weak implementations of RSA instead of side channel attacks where the attackers requires physical access to the system itself. …”
    Get full text
    Final Year Project (FYP)
  17. 337

    Coevolving Cybersecurity Adversaries for Industrial Control Systems in Failure-Prone Environments by Wicks, Kathryn

    Published 2024
    “…Expanding on this idea, an attacker is then trained to adversarially mask a dataset, and a detector is co-evolved alongside it to detect the attacks. …”
    Get full text
    Thesis
  18. 338

    Cybersecurity Blue Team Strategies : Uncover the secrets of blue teams to combat cyber threats in your organization / by Sehgal, Kunal, author 656353, Thymianis, Nikolaos, author 656355, Packt Publishing (Online service) 656336

    Published 2023
    “…Through the course of this book, you’ll learn defensive cybersecurity measures while thinking from an attacker's perspective. With this book, you'll be able to test and assess the effectiveness of your organization’s cybersecurity posture. …”
    Get full text
    Get full text
    software, multimedia
  19. 339

    Synthesis and testing of asynchronous circuits - micropipeline by Khaing, Kathy.

    Published 2008
    “…The checker is designed to meet the Totally Self-Checking (TSC) goal based on the existing checker design concepts.…”
    Get full text
    Thesis
  20. 340

    Component-based security under partial compromise by Dehnel-Wild, M

    Published 2018
    “…Can these systems still operate correctly and securely even when partially compromised by an attacker? Can we improve the languages and tools we use to model systems under partial compromise?…”
    Thesis