Results 11 to 20 of about 202 (132)
Are menstrual periods an environmental liability? Period poverty and eco-feminist bioethics. [PDF]
Abstract Period poverty has led to many initiatives across the world. In some places, period (or menstrual hygiene management [MHM]) products are free and readily found in restaurants, universities and pubs. However, conversations on mensuration management have also led to discussions on sustainability.
Richie C.
europepmc +2 more sources
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches [PDF]
HTTP Parameter Pollution (HPP) vulnerabilities allow attackers to exploit web applications by manipulating the query parameters of the requested URLs. In this paper, we present Application Request Cache (ARC), a framework for protecting web applications against HPP exploitation.
Elias Athanasopoulos +3 more
openaire +1 more source
A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture
Basic Named Data Networks (NDN) security mechanisms, rely on twomain key features. The first one is the caching mechanism where it manages to minimize both the bandwidth usage and the data retrieval delay all along with congestionavoidance by storing, in the intermediate routers, the contents recently demanded toquickly serve future consumers’ requests.
Hidouri, Abdelhak +4 more
openaire +1 more source
XGBoost-Based Detection of DDoS Attacks in Named Data Networking
Named Data Networking (NDN) is highly susceptible to Distributed Denial of Service (DDoS) attacks, such as Interest Flooding Attack (IFA) and Cache Pollution Attack (CPA).
Liang Liu +3 more
doaj +1 more source
Predators and scavengers: Polar bears as marine carrion providers
Scavenging is a foraging strategy widely used across the animal kingdom and apex predators provide a large amount of energy in a food web by provisioning carrion. In the harsh environmental conditions of the Arctic, apex predators such as polar bears Ursus maritimus can provide scavenging opportunities for many species. Carrion can act as a buffer when
Holly E. L. Gamblin +5 more
wiley +1 more source
This paper presents a comprehensive review of Internet of Things (IoT)‐deep reinforcement learning (DRL) integration for smart building energy management, with an emphasis on addressing renewable energy variability, real‐time decision‐making and interoperability challenges.
Tehseen Mazhar +2 more
wiley +1 more source
ABSTRACT Smart cities represent transformative urban ecosystems, leveraging advanced technologies to address challenges posed by rapid urbanisation, energy efficiency demands, and sustainability goals. Despite extensive research, a comprehensive and integrated literature analysis combining AI‐based communication, energy management, cybersecurity, and ...
Maaz Tahir Malik +5 more
wiley +1 more source
THE CONTESTED URBANISM OF ABANDONMENT: The Afterlife of Two Distressed Neighborhoods in Detroit
Abstract In post‐industrial cities in decline, what happens to leftover spaces after abandonment? This question lies at the root of trying to make sense of entrenched distress in neighborhoods in deindustrializing Detroit, a city struggling for more than five decades with disinvestment, job losses, population shrinkage, a collapsed housing market ...
Martin J. Murray +2 more
wiley +1 more source
Information centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices.
Marwa Kareem Sameer +1 more
openaire +1 more source
Dynamic Risk From Mexican Wolves and Mountain Lions Influences Elk Foraging Behavior
We observed elk foraging across a wolf risk gradient throughout all seasons and diel periods to quantify proportions of foraging, intense vigilance, and multitasking at the individual and herd levels. We quantified encounter and kill risk from Mexican wolves and mountain lions using habitat selection functions and utilization distributions.
Julia E. Olson +8 more
wiley +1 more source

