Search alternatives:
peers » peer (Expand Search)
hackers » trackers (Expand Search)
Showing 321 - 340 results of 10,187 for search '(peers OR (when OR ((hackers OR attacks) OR (checker OR checked))))', query time: 0.13s Refine Results
  1. 321

    A moment of change: facilitating refugee children's mental health in UK schools by Fazel, M

    Published 2015
    “…This paper describes the role of schools in supporting the overall development of refugee children and the importance of peer interactions. It argues that the UK school into which a refugee child arrives can be considered an extreme setting. …”
    Journal article
  2. 322

    Enforcing Identification and Authentication Policies at Scale in a Cloud Microservices Architecture by Sinha, Varnika

    Published 2024
    “…We implement a framework that accounts for these secrets by managing the creation, rotation, and deletion in accordance with the existing architecture of the platform with a Kubernetes custom resource and controller and ensure that a secret with the correct permissions is always present when needed.…”
    Get full text
    Get full text
    Thesis
  3. 323

    Digital forensic readiness in Iot-enabled organisations and forensic investigation analysis in real-time by Oyeyemi, Kuku, Chrysikos, Alexandros, Salekzamankhani, Shahram

    Published 2024
    “…The wide application of the technology has exposed it to cyber threats and attacks due to limitations in the technology itself. …”
    Get full text
    Article
  4. 324

    Katibah Nusantara and its threat to the Southeast Asian region by Lim, Jacinta Yinfang

    Published 2018
    “…Focus is also given to the two key attacks in Southeast Asia that involved ISIS elements, mainly the Jan 2015 Jakarta attacks in Indonesia and the Jun 2016 Puchong attack in Malaysia. …”
    Get full text
    Thesis
  5. 325

    Impact of innovation on performance of shipping companies in Singapore by Nah, Laura Yan Ling

    Published 2009
    “…A survey with 17 Singapore-registered ship-owning companies was conducted and results were checked for validity using the Spearman’s rho and Cronbach’s alpha tests. …”
    Get full text
    Final Year Project (FYP)
  6. 326

    Forecasting air passenger volume in Singapore: Determining the explanatory variables for econometric models by Guo, Rui, Zhong, Zhao Wei

    Published 2017
    “…Before applying for model simulation, correlations among variables were checked. Various combinations of the variables were implemented to establish the models. …”
    Get full text
    Get full text
    Journal Article
  7. 327

    Mothers’ social networks and socioeconomic gradients of isolation by Andrew, AR, Attanasio, O, Augsburg, B, Behrman, J, Day, M, Jervis, P, Meghir, C, Phimister, A

    Published 2024
    “…Wealthier women and women from more-advantaged castes and tribes have smaller networks than their less-advantaged peers, primarily because they know fewer women within their own socioeconomic group. …”
    Journal article
  8. 328

    How to choose a law review: an empirical study by Cofone, I, Malé, P-JG

    Published 2023
    “…The optimal publication strategy for authors depends on whether they want to maximize prestige among peers or rather their impact on the discipline, as well as on authors’ career stage and risk averseness. …”
    Journal article
  9. 329

    Adversarial example construction against autonomous vehicle (part 2) by Toh, Koo Fong

    Published 2021
    “…However, DNN is vulnerable to cybersecurity attacks such as adversarial attacks. Such cybersecurity flaws in the vehicle can cause a huge impact on the trust of the autonomous vehicle industry. …”
    Get full text
    Final Year Project (FYP)
  10. 330

    Facial spoofing indicator using deep learning by Lim, Eugen Wei Jie

    Published 2022
    “…Therefore, the aim of this project is to find ways on how to improve the current deep learning models by approaching photo attacks. Photo attack datasets were used to train the model and to test its accuracy by classifying 2 classes of images into fake and real. …”
    Get full text
    Final Year Project (FYP)
  11. 331

    Visualized simulation platform development of cyber physical systems by Low, Xin Hui

    Published 2024
    “…The realization of these powerful features heavily relies on the network, which might be compromised and exploited to cause irreparable damage or privacy leakage by malicious attacks. Thus, this project aims to develop a platform equipped with a visual interface that could demonstrate the compromised running processes of single water tank system and smart grids under cyber-attacks specifically data-deception attack and the secure operations of these systems aided with resilient or privacy-preserving controllers.…”
    Get full text
    Final Year Project (FYP)
  12. 332

    Mappings, dimensionality and reversing out of deep neural networks by Cui, Z, Grindrod, P

    Published 2023
    “…We argue that this phenomenon may result in a vulnerability to (universal) adversarial attacks (which are small specific perturbations). …”
    Journal article
  13. 333

    Three essays on corporate finance by Fu, Kangkang

    Published 2016
    “…These results are more pronounced when customers’ environmental risk is lower. Collectively, our findings suggest that improving the trading relationship with principal customers is an important channel through which firms can benefit economically from being environmentally responsible. …”
    Get full text
    Thesis
  14. 334

    Density, laying date, breeding success and diet of Black Kites Milvus migrans govinda in the city of Delhi (India) by Kumar, N, Mohan, D, Jhala, YV, Qureshi, Q, Sergio, F

    Published 2014
    “…A sample of 151 nests was checked regularly to record laying date, breeding success and diet.…”
    Journal article
  15. 335
  16. 336

    Singapore Shipping Trust. by Goh, Wei Qin., Lee, Suat Cheng., Tan, Li Ping.

    Published 2009
    “…We also explore the shipping trusts’ financial performance through comparison with the Singapore market, as well as with Singapore REITs, Singapore shipping stocks and their foreign peers. Results from CAPM show presence of risk-adjusted returns for the equal-weighted shipping trust portfolio in the before-subprime period, indicating the attractiveness of shipping trusts during better economic conditions. …”
    Get full text
    Final Year Project (FYP)
  17. 337

    The friendly muse : ADM student wellbeing by Low, Eudora Yu Lin

    Published 2017
    “…Drawing from personal experience and that of fellow peers, the project investigates how to create a more relatable, approachable and contextualized experience for ADM students.…”
    Get full text
    Final Year Project (FYP)
  18. 338

    Development of an application to improve mental health (A) by Khor, Chin Yi

    Published 2023
    “…Next, the application also consists of an interactive, hands-on session with the application, stimulating a peer with a psychological issue. The application will give the possible scenarios when handling a mental health patient to user. …”
    Get full text
    Final Year Project (FYP)
  19. 339

    Monitoring and alerting system for epilepsy patients by Amandis Singh Dhillon

    Published 2017
    “…This developed system provides a non-invasive mean of monitoring and studying a possible seizure attack and an alert the caregivers via SMS to give the patient the necessary assistance. …”
    Get full text
    Final Year Project (FYP)
  20. 340

    SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments by Li, Mengyuan, Yang, Yuheng, Chen, Guoxing, Yan, Mengjia, Zhang, Yinqian

    Published 2024
    “…While great efforts from both sides have been made in developing a confidential computing ecosystem, the existence of server-side TEEs with drastically different designs and the presence of various known attacks have significantly increased the difficulty of understanding TEE designs and the reasons behind existing attacks. …”
    Get full text
    Article