Results 61 to 70 of about 897,349 (250)
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking
Information-Centric Networking (ICN) is an internetworking paradigm that offers an alternative to the current IP\nobreakdash-based Internet architecture.
Compagno, Alberto +3 more
core +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
(Dis)information Systems: a Systemic View of Disinformation
ABSTRACT Disinformation is an ancient social phenomenon that has found a favourable environment for dissemination in internet‐based social networks. While the scientific community seeks to address the problem by creating specific tools to detect and classify the various types of false information, we argue that systems thinking is necessary to ...
Herbert Laroca +2 more
wiley +1 more source
Taking the Harper Government’s Refugee Policy to Court [PDF]
There is no question that significant changes occurred in Canadian refugee policy under the Conservative government of Stephen Harper during its near ten years in power. Indeed, observers note that virtually no aspect was left untouched.
Anderson, Christopher G. +1 more
core
In this work, three-dimensional numerical investigations into flow manipulation have been conducted using the principles of magnetohydrodynamics, followed by the analysis of the phenomenon of species mixing in a Carreau–Yasuda-type fluid.
Chitradittya Barman, Aditya Bandopadhyay
semanticscholar +1 more source
In this article, I analyze my interviews with Mark (pseudonym), a social scientist who committed major academic fraud in over 50 top‐tier journal articles in the first decade of this century. I explain how stigma played a central role in how Mark and I shaped our interaction. I focus on how Mark, a former Professor and Dean with a distinguished career,
Thaddeus Müller
wiley +1 more source
SDNsec: Forwarding Accountability for the SDN Data Plane
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be
Hoefler, Torsten +4 more
core +1 more source
In the aftermath of the 2020 U.S. election, the boundary between activism and extremism blurred, with election officials reporting violent threats and false accusations of election fraud. From a symbolic interactionist perspective, these attacks provide a unique lens for examining the consequences of being falsely labeled a criminal.
Steven Windisch
wiley +1 more source
Performing Integrity: Managing Misalignment while Researching Transgressive Social Worlds
The qualitative literature criticizing REBs suggests that researchers should develop an approach to research ethics that does justice to their daily practice of fieldwork. In this article, I contribute to this exploration by presenting three cases of negotiating research ethics while researching transgressive social worlds.
Thaddeus Müller
wiley +1 more source
FakeStack: Hierarchical Tri-BERT-CNN-LSTM stacked model for effective fake news detection. [PDF]
Keya AJ +3 more
europepmc +1 more source

