Skip to search formSkip to main contentSkip to account menu

Shatter attack

Known as: Shatter, Shatter attacks 
In computing, a shatter attack is a programming technique employed by crackers on Microsoft Windows operating systems to bypass security restrictions… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Symmetry breaking is a technique for speeding up propositional satisfiability testing by adding constraints to the theory that… 
2008
2008
Accurate prediction of the generalization ability of a learning algorithm is an important problem in computational learning… 
2008
2008
Scientific visualization often requires display and perception of depth and 3D in various applications. A CGI application has… 
2006
2006
Abstract— Shatter cones have been described from many meteorite impact structures and are widely regarded as a diagnostic… 
Review
2000
Review
2000
Research on sex differences in leadership styles over the past decade (1987-1999) is reviewed and compared with the results of a… 
Highly Cited
1977
Highly Cited
1977
In 1968, a series of 0.5-ton and 100-ton TNT explosion experiments were conducted in granitic rock near Cedar City, Utah, as part… 
1975
1975
SHATTER cones, products of shock metamorphism, have been discovered at Haughton Dome and indicate a meteorite impact origin for… 
1964
1964
SHATTER-CONING, a unique type of conical fracturing, appears to be a criterion for shock-induced over-pressures in rock. As such…