Search alternatives:
peers » peer (Expand Search)
hackers » trackers (Expand Search)
attackers » attacks (Expand Search), attackss (Expand Search), attacheds (Expand Search)
attacheds » attached (Expand Search), attaches (Expand Search), attacked (Expand Search)
attacker » attacks (Expand Search), attack (Expand Search), attached (Expand Search)
peers » peer (Expand Search)
hackers » trackers (Expand Search)
attackers » attacks (Expand Search), attackss (Expand Search), attacheds (Expand Search)
attacheds » attached (Expand Search), attaches (Expand Search), attacked (Expand Search)
attacker » attacks (Expand Search), attack (Expand Search), attached (Expand Search)
-
321
-
322
-
323
-
324
Shared spaces & identity, culture and meaning: a study on the role of integrated community hubs on social interaction, meaning-making & identity creation in neighbourhoods
Published 2024Subjects: Get full text
Final Year Project (FYP) -
325
-
326
Dataset of parent-child hyperscanning functional near-infrared spectroscopy recordings
Published 2022Subjects: Get full text
Journal Article -
327
-
328
-
329
-
330
当青春成为最后的乌托邦 :探析 "小字辈" 文本所影射的文化现象 = When youth becomes the last utopia : a study of the 'tiny texts' cultural phenomena
Published 2021Get full text
Final Year Project (FYP) -
331
-
332
自译与他译 :论黄孟文《再见惠兰的时候》不同英译版本的翻译策略 = Self-translation and conventional translation : the different versions of Wong Meng Voon’s when I see Hui Lan again and its translation strategies
Published 2020“…It also came from the work experiences he had when he was working in both the government and business sector. …”
Get full text
Final Year Project (FYP) -
333
大时代小人物的命运: 论新加坡教育改革下华校师生对语言的情意结 = Fate of individuals in a revolutionary era: a study on the language attachment of Chinese school teachers and students under Singapore's educational reform
Published 2024“…Each of them harboured a strong emotional attachment to their first language - Chinese. …”
Get full text
Final Year Project (FYP) -
334
21A.350J / SP.484J / STS.086J / WGS.484J The Anthropology of Computing, Fall 2004
Published 2004Subjects: Get full text
Learning Object -
335
The Importance of Bystanders in Threat Assessment and Management
Published 2025“…They are the reason that some planned attacks are foiled before they occur. Numerous studies of targeted violence (e.g., mass shootings and school shootings), have demonstrated that peers and bystanders often have knowledge of an attacker’s intentions, concerning communication, and troubling behavior before the attack occurs. …”
Get full text
Book chapter -
336
Weak implementation of RSA algorithm
Published 2023“…The objective of this project is to research on the mathematical algorithms and investigate the various weak implementation that an attacker may use to attack the RSA algorithm. For this project, the focus will be on weak implementations of RSA instead of side channel attacks where the attackers requires physical access to the system itself. …”
Get full text
Final Year Project (FYP) -
337
Coevolving Cybersecurity Adversaries for Industrial Control Systems in Failure-Prone Environments
Published 2024“…Expanding on this idea, an attacker is then trained to adversarially mask a dataset, and a detector is co-evolved alongside it to detect the attacks. …”
Get full text
Thesis -
338
Cybersecurity Blue Team Strategies : Uncover the secrets of blue teams to combat cyber threats in your organization /
Published 2023“…Through the course of this book, you’ll learn defensive cybersecurity measures while thinking from an attacker's perspective. With this book, you'll be able to test and assess the effectiveness of your organization’s cybersecurity posture. …”
Get full text
Get full text
software, multimedia -
339
Synthesis and testing of asynchronous circuits - micropipeline
Published 2008“…The checker is designed to meet the Totally Self-Checking (TSC) goal based on the existing checker design concepts.…”
Get full text
Thesis -
340
Component-based security under partial compromise
Published 2018“…Can these systems still operate correctly and securely even when partially compromised by an attacker? Can we improve the languages and tools we use to model systems under partial compromise?…”
Thesis