Skip to search formSkip to main contentSkip to account menu

Shatter attack

Known as: Shatter, Shatter attacks 
In computing, a shatter attack is a programming technique employed by crackers on Microsoft Windows operating systems to bypass security restrictions… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Tujuan penelitian untuk mengetahui pengaruh suhu dan lama pengeringan pada briket arang tempurung kelapa dengan variasi suhu yang… 
2015
2015
Symmetry breaking is a technique for speeding up propositional satisfiability testing by adding constraints to the theory that… 
2012
2012
This thesis examines acoustic parameters of five consonants /m, n, ŋ, l, s/ in two dialects of British English: Standard Southern… 
2010
2010
Abstract– Although the meteorite impact origin of the Keurusselkä impact structure (central Finland) has been established on the… 
2005
2005
The Amelia Creek impact structure is located in Australia's Northern Territory in folded Palaeoproterozoic strata of the… 
Highly Cited
2004
Highly Cited
2004
Researchers have conclusively shown that Sinapis alba (commonly known as yellow mustard) has many agronomic traits which would be… 
Highly Cited
1984
Highly Cited
1984
SummaryA new test procedure for measuring shatter-resistance of siliquae of Brassica spp. is described. A siliqua with its… 
Highly Cited
1977
Highly Cited
1977
In 1968, a series of 0.5-ton and 100-ton TNT explosion experiments were conducted in granitic rock near Cedar City, Utah, as part… 
Review
1977
Review
1977
Shatter cone characteristics are surveyed. Shatter cones, a form of rock fracture in impact structures, apparently form as a… 
1975
1975
SHATTER cones, products of shock metamorphism, have been discovered at Haughton Dome and indicate a meteorite impact origin for…