Zobrazeno 1 - 10
of 340
pro vyhledávání: '"Russell Gordon"'
Publikováno v:
Fermentation, Vol 4, Iss 4, p 89 (2018)
The presence of lipids in wort and beer are important due to their influence on yeast metabolism and beer quality. Barley lipids have long been considered to have adverse effects on beer quality where some long-chain fatty acids are associated with h
Externí odkaz:
https://doaj.org/article/9bb756d09da74beba837e5fd08378bdd
Autor:
Russell Gordon, Daniel Cozzolino, Shaneel Chandra, Aoife Power, Jessica J. Roberts, James Chapman
Publikováno v:
Beverages, Vol 3, Iss 4, p 57 (2017)
Classification of a series of Australian beers was performed using synchronous scanning fluorescence spectroscopy and emission-excitation matrices based on the IR fingerprint regions. The results indicate that synchronous scanning fluorescence spectr
Externí odkaz:
https://doaj.org/article/c10394d06b5a46f193dab3241e7ece42
Autor:
McKeown, Sean, Russell, Gordon
The High Efficiency File Format (HEIF) was adopted by Apple in 2017 as their favoured means of capturing images from their camera application, with Android devices such as the Galaxy S10 providing support more recently. The format is positioned to re
Externí odkaz:
http://arxiv.org/abs/2006.08060
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Malware writers frequently try to hide the activities of their agents within tunnelled traffic. Within the Kill Chain model the infection time is often measured in seconds, and if the infection is not detected and blocked, the malware agent, such as
Externí odkaz:
http://arxiv.org/abs/1907.11954
There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly resistant to side-channel attacks, cryptographic artefacts may exist in memo
Externí odkaz:
http://arxiv.org/abs/1907.11941
Publikováno v:
Computers & Security 76 (2018): 197-213
One major problem with cyberbullying research is the lack of data, since researchers are traditionally forced to rely on survey data where victims and perpetrators self-report their impressions. In this paper, an automatic data collection system is p
Externí odkaz:
http://arxiv.org/abs/1907.10855
Publikováno v:
Digital Investigation, Volume 29, June 2019, Pages 109-117
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts required for decrypting secure communications. This paper develops the MemDec
Externí odkaz:
http://arxiv.org/abs/1907.10835
Publikováno v:
In Ad Hoc Networks 1 September 2021 120