-
321
A moment of change: facilitating refugee children's mental health in UK schools
Published 2015“…This paper describes the role of schools in supporting the overall development of refugee children and the importance of peer interactions. It argues that the UK school into which a refugee child arrives can be considered an extreme setting. …”
Journal article -
322
Enforcing Identification and Authentication Policies at Scale in a Cloud Microservices Architecture
Published 2024“…We implement a framework that accounts for these secrets by managing the creation, rotation, and deletion in accordance with the existing architecture of the platform with a Kubernetes custom resource and controller and ensure that a secret with the correct permissions is always present when needed.…”
Get full text
Get full text
Thesis -
323
Digital forensic readiness in Iot-enabled organisations and forensic investigation analysis in real-time
Published 2024“…The wide application of the technology has exposed it to cyber threats and attacks due to limitations in the technology itself. …”
Get full text
Article -
324
Katibah Nusantara and its threat to the Southeast Asian region
Published 2018“…Focus is also given to the two key attacks in Southeast Asia that involved ISIS elements, mainly the Jan 2015 Jakarta attacks in Indonesia and the Jun 2016 Puchong attack in Malaysia. …”
Get full text
Thesis -
325
Impact of innovation on performance of shipping companies in Singapore
Published 2009“…A survey with 17 Singapore-registered ship-owning companies was conducted and results were checked for validity using the Spearman’s rho and Cronbach’s alpha tests. …”
Get full text
Final Year Project (FYP) -
326
Forecasting air passenger volume in Singapore: Determining the explanatory variables for econometric models
Published 2017“…Before applying for model simulation, correlations among variables were checked. Various combinations of the variables were implemented to establish the models. …”
Get full text
Get full text
Journal Article -
327
Mothers’ social networks and socioeconomic gradients of isolation
Published 2024“…Wealthier women and women from more-advantaged castes and tribes have smaller networks than their less-advantaged peers, primarily because they know fewer women within their own socioeconomic group. …”
Journal article -
328
How to choose a law review: an empirical study
Published 2023“…The optimal publication strategy for authors depends on whether they want to maximize prestige among peers or rather their impact on the discipline, as well as on authors’ career stage and risk averseness. …”
Journal article -
329
Adversarial example construction against autonomous vehicle (part 2)
Published 2021“…However, DNN is vulnerable to cybersecurity attacks such as adversarial attacks. Such cybersecurity flaws in the vehicle can cause a huge impact on the trust of the autonomous vehicle industry. …”
Get full text
Final Year Project (FYP) -
330
Facial spoofing indicator using deep learning
Published 2022“…Therefore, the aim of this project is to find ways on how to improve the current deep learning models by approaching photo attacks. Photo attack datasets were used to train the model and to test its accuracy by classifying 2 classes of images into fake and real. …”
Get full text
Final Year Project (FYP) -
331
Visualized simulation platform development of cyber physical systems
Published 2024“…The realization of these powerful features heavily relies on the network, which might be compromised and exploited to cause irreparable damage or privacy leakage by malicious attacks. Thus, this project aims to develop a platform equipped with a visual interface that could demonstrate the compromised running processes of single water tank system and smart grids under cyber-attacks specifically data-deception attack and the secure operations of these systems aided with resilient or privacy-preserving controllers.…”
Get full text
Final Year Project (FYP) -
332
Mappings, dimensionality and reversing out of deep neural networks
Published 2023“…We argue that this phenomenon may result in a vulnerability to (universal) adversarial attacks (which are small specific perturbations). …”
Journal article -
333
Three essays on corporate finance
Published 2016“…These results are more pronounced when customers’ environmental risk is lower. Collectively, our findings suggest that improving the trading relationship with principal customers is an important channel through which firms can benefit economically from being environmentally responsible. …”
Get full text
Thesis -
334
Density, laying date, breeding success and diet of Black Kites Milvus migrans govinda in the city of Delhi (India)
Published 2014“…A sample of 151 nests was checked regularly to record laying date, breeding success and diet.…”
Journal article -
335
An Unusual Harassment Training That Was Warmly Received and Also Inspired Bystanders
Published 2025Get full text
Working Paper -
336
Singapore Shipping Trust.
Published 2009“…We also explore the shipping trusts’ financial performance through comparison with the Singapore market, as well as with Singapore REITs, Singapore shipping stocks and their foreign peers. Results from CAPM show presence of risk-adjusted returns for the equal-weighted shipping trust portfolio in the before-subprime period, indicating the attractiveness of shipping trusts during better economic conditions. …”
Get full text
Final Year Project (FYP) -
337
The friendly muse : ADM student wellbeing
Published 2017“…Drawing from personal experience and that of fellow peers, the project investigates how to create a more relatable, approachable and contextualized experience for ADM students.…”
Get full text
Final Year Project (FYP) -
338
Development of an application to improve mental health (A)
Published 2023“…Next, the application also consists of an interactive, hands-on session with the application, stimulating a peer with a psychological issue. The application will give the possible scenarios when handling a mental health patient to user. …”
Get full text
Final Year Project (FYP) -
339
Monitoring and alerting system for epilepsy patients
Published 2017“…This developed system provides a non-invasive mean of monitoring and studying a possible seizure attack and an alert the caregivers via SMS to give the patient the necessary assistance. …”
Get full text
Final Year Project (FYP) -
340
SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments
Published 2024“…While great efforts from both sides have been made in developing a confidential computing ecosystem, the existence of server-side TEEs with drastically different designs and the presence of various known attacks have significantly increased the difficulty of understanding TEE designs and the reasons behind existing attacks. …”
Get full text
Article