Search alternatives:
peers » peer (Expand Search)
hackers » trackers (Expand Search)
Showing 241 - 260 results of 10,187 for search '(peers OR (when OR ((hackers OR attacks) OR (checker OR checked))))', query time: 0.14s Refine Results
  1. 241

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  2. 242

    The Importance of Bystanders in Threat Assessment and Management by Borum, Randy, Rowe, Mary

    Published 2025
    “…They are the reason that some planned attacks are foiled before they occur. Numerous studies of targeted violence (e.g., mass shootings and school shootings), have demonstrated that peers and bystanders often have knowledge of an attacker’s intentions, concerning communication, and troubling behavior before the attack occurs. …”
    Get full text
    Book chapter
  3. 243

    Challenges of online collaborative learning among special needs university students by Hidayu Shafie, Ireena Nasiha Ibnu, Noori, Abdullah, Nurhilleny Rosly, Nadia Anuar, Nur Husna Serip Mohamad

    Published 0002
    “…In addition, they also did not have many issues with assistance tools and technology when doing online work with their peers. In conclusion, to ensure that SNS have a meaningful learning experience in collaborative learning, all parties should be made aware of and given exposure on working with SNS in all educational institutions in the online setting.…”
    Get full text
    Article
  4. 244
  5. 245

    Influence of presumed influence on thinness as a beauty ideal for girls. by Soh, Wai Siong.

    Published 2008
    “…It was interesting that when it comes to the influence on the desire to be thin, we could only see that the “influence of self” has an impact on the desire to be thin. …”
    Get full text
    Thesis
  6. 246

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  7. 247

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…Mobile users are enticed by this secondary form of mobile communication because of its generally low cost when compared to making a phone call. However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. …”
    Get full text
    Final Year Project (FYP)
  8. 248

    GPU-accelerated real-time motion planning for safe human-robot collaboration by Fujii, Shohei

    Published 2024
    “…Our method guarantees the safety of human operators in the sense that the robot will collide only when the robot has a zero velocity, in accordance with ISO safety standards. …”
    Get full text
    Thesis-Doctor of Philosophy
  9. 249

    Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes by Tay, Eng Boon.

    Published 2008
    “…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
    Get full text
    Thesis
  10. 250

    Study of cascade failures of power grids by Ng, Jason Wei Long.

    Published 2013
    “…The effects of the high and low load attacks are identical at α = 0.8 and only when α  1 then high load attack will cause a greater cascading failure. …”
    Get full text
    Final Year Project (FYP)
  11. 251

    Design and development of small scale index matching tunnel by Tan, Yu Tiong

    Published 2017
    “…Suitable design and sodium thiosulfate is used, to overcome the issue of rapid oxidation of the sodium iodide solution when it is exposed to the atmosphere. Then, the results of the experiment are cross-checked with the theoretical equations, an analysis is being accounted for the difference in result. …”
    Get full text
    Final Year Project (FYP)
  12. 252

    Please, let me go / by Spencer, Caitlin, author 656310, Brown, Linda Watson author 656311

    Published 2017
    “…At a time when the abuse ring realities of young white women in Rotherham and other major English cities are coming to light, Caitlin's story will appal readers - not just because of the degree of horrific attacks which were perpetrated upon her, but also because of the ways in which the authorities refused to act. …”
    text
  13. 253

    Design and development of a web-based platform for EEE MSc student orientation by Soo, Serena Keng Shuang

    Published 2023
    “…Transition is a phase that all students face when they advance from an educational level to the next. …”
    Get full text
    Final Year Project (FYP)
  14. 254

    Software implementation of side-channel analysis on AES encryption with different key length by Heng, Denley Jing Jie

    Published 2022
    “…Cryptographic algorithms such as Advanced Encryption Standard (AES) are usually strong against mathematical attacks even with a huge amount of computing power. …”
    Get full text
    Final Year Project (FYP)
  15. 255

    The GCSE attainment gap: assessing the influence of permanent school exclusion by Hills, Stephen, Walker, Matthew, Guinn, James, Kent, Aubrey

    Published 2025
    “…Research has shown that pupils who have been permanently excluded are at a greater risk of negative life outcomes when compared with their non-excluded peers. However, the idea that disadvantaged groups are disproportionately represented amongst those excluded has not previously been tested in prior work. …”
    Get full text
    Get full text
    Article
  16. 256

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  17. 257

    The Mark of Cain: The crime of terrorism in times of armed conflict as interpreted by the Court of Appeal of England and Wales in R v. Mohammed Gul by Coco, A

    Published 2013
    “…On 22 February 2012, the Court of Appeal of England and Wales was called on to interpret the definition of the crime of terrorism as contained in relevant United Kingdom (UK) legislation. When confronted with defence arguments grounded in international law, the Court denied that attacks by non-state armed groups against governmental armed forces in a non-international armed conflict may be exempted from being labelled as terrorist acts. …”
    Journal article
  18. 258

    Machine learning for industrial IOT by Yeow, Brandon Wei Liang

    Published 2023
    “…The algorithm preferentially chooses to run FedAvg to reduce bandwidth cost unless historically this peer has not provided significant improvement. Sharing data is done when there is little improvement left for FedAvg to achieve and we have sufficient bandwidth for it.…”
    Get full text
    Final Year Project (FYP)
  19. 259

    Towards a more trustworthy generative artificial intelligence by Cheong, Ben Wee Joon

    Published 2024
    “…However, with these advancements comes new challenges, especially in ensuring the robustness and reliability of such models when faced with adversarial attacks. Adversarial attacks are attacks that exploits the vulnerabilities of Generative AI models by subtly altering the input data, also known as perturbations, to deceive the models into making hallucinated, distorted, or incorrect predictions. …”
    Get full text
    Final Year Project (FYP)
  20. 260

    StudentGO web application by Xie, Zijian

    Published 2023
    “…It would also strongly promote a community of students who help each other when in need.…”
    Get full text
    Final Year Project (FYP)