Skip to search formSkip to main contentSkip to account menu

Shatter attack

Known as: Shatter, Shatter attacks 
In computing, a shatter attack is a programming technique employed by crackers on Microsoft Windows operating systems to bypass security restrictions… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Tujuan penelitian untuk mengetahui pengaruh suhu dan lama pengeringan pada briket arang tempurung kelapa dengan variasi suhu yang… 
Review
2017
Review
2017
A comprehensive survey of geologic structures formed in the Earth’s brittle regime in the eastern Española Basin and flank of the… 
2015
2015
Symmetry breaking is a technique for speeding up propositional satisfiability testing by adding constraints to the theory that… 
2008
2008
Accurate prediction of the generalization ability of a learning algorithm is an important problem in computational learning… 
2005
2005
The Amelia Creek impact structure is located in Australia's Northern Territory in folded Palaeoproterozoic strata of the… 
Review
2000
Review
2000
Research on sex differences in leadership styles over the past decade (1987-1999) is reviewed and compared with the results of a… 
Highly Cited
1984
Highly Cited
1984
SummaryA new test procedure for measuring shatter-resistance of siliquae of Brassica spp. is described. A siliqua with its… 
Highly Cited
1977
Highly Cited
1977
In 1968, a series of 0.5-ton and 100-ton TNT explosion experiments were conducted in granitic rock near Cedar City, Utah, as part… 
1975
1975
SHATTER cones, products of shock metamorphism, have been discovered at Haughton Dome and indicate a meteorite impact origin for… 
1964
1964
SHATTER-CONING, a unique type of conical fracturing, appears to be a criterion for shock-induced over-pressures in rock. As such…