Skip to search formSkip to main contentSkip to account menu

Shatter attack

Known as: Shatter, Shatter attacks 
In computing, a shatter attack is a programming technique employed by crackers on Microsoft Windows operating systems to bypass security restrictions… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Tujuan penelitian untuk mengetahui pengaruh suhu dan lama pengeringan pada briket arang tempurung kelapa dengan variasi suhu yang… 
2016
2016
This research work was conducted on economic feasibility of briquette made of coconut coir dust mixed with rice husk at different… 
Highly Cited
2015
Highly Cited
2015
This paper combines experimental data with simple mathematical models to investigate the influence of spray formulation type and… 
2015
2015
Symmetry breaking is a technique for speeding up propositional satisfiability testing by adding constraints to the theory that… 
2010
2010
Abstract– The Vista Alegre structure, centered at 25°57′S and 52°41′W, has been recently proposed as a meteorite impact structure… 
2010
2010
Abstract– Although the meteorite impact origin of the Keurusselkä impact structure (central Finland) has been established on the… 
2005
2005
Abstract— Landsat TM, aerial photograph image analysis, and field mapping of Witwatersrand supergroup meta‐sedimentary strata in… 
Highly Cited
2003
Highly Cited
2003
We prove strong lower bounds for the space complexity of (/spl epsi/, /spl delta/)-approximating the number of distinct elements… 
Highly Cited
2001
Highly Cited
2001
1. Introduction.- 1.1. References.- 2. Concentration Inequalities.- 2.1. Hoeffding's Inequality.- 2.2. An Inequality for the… 
Highly Cited
2001
Highly Cited
2001
Chuquicamata, in northern Chile, is the world’s greatest copper orebody. It was controlled, from the initial intrusions (probably…