Detecting command injection attacks in web applications based on novel deep learning methods. [PDF]
Wang X, Zhai J, Yang H.
europepmc +1 more source
Black Fugitivity in the Sporting Workplace: The Story of Eniola Aluko
ABSTRACT Being a Black fugitive involves constant movement: to find and cultivate spaces of safety and hope. In this paper, I curate a sporting archive about the UK Black women's elite football player Eniola Aluko to read her as a Black fugitive. I demonstrate how she traversed a racist and anti‐Black sporting workplace—where she was unfairly demonized
Aarti Ratna
wiley +1 more source
Intrusion detection with HACDT-Net and TRBM-Net using a hybrid deep learning framework with enhanced sampling techniques. [PDF]
Padma Priya N, Mohanbabu G.
europepmc +1 more source
ABSTRACT Species distribution models (SDMs) are widely used to predict the spread of invasive species, yet their accuracy over time and the influence of climate data resolution remain unclear. Here, we examine the capacity of SDMs to predict the distribution and short‐term expansion of the invasive gall wasp Dryocosmus kuriphilus, and compare the ...
José Carlos Pérez‐Girón +3 more
wiley +1 more source
Securing web applications against XSS and SQLi attacks using a novel deep learning approach. [PDF]
Tadhani JR +4 more
europepmc +1 more source
Masculinity Development in the Manosphere: An Ecological Systems Perspective
ABSTRACT Guided by Ecological Systems theory, this article examines how the manosphere—a network of antifeminist online communities—functions as a developmental context shaping boys' and young men's masculinity development. Drawing on research about adolescence, digital socialization, and masculinity, we argue that algorithm‐driven digital platforms ...
Alison C. White, Amie Zarling
wiley +1 more source
A cost effective machine learning based network intrusion detection system using Raspberry Pi for real time analysis. [PDF]
Wijethilaka RWKS, Yapa K, Siriwardena D.
europepmc +1 more source
Multi‐State Implementation of the Alzheimer's Association Dementia Care Coordination (DCC) Program
Facilitators and Barriers to DCC Program Implementation. ABSTRACT Background The Alzheimer's Association partnered with health systems in Illinois, Greater Missouri, and Washington to implement and evaluate the Knight Family dementia care coordination (DCC) program, a novel telephone‐based care coordination service that bridged the gap between clinical
Nancy A. Hodgson +7 more
wiley +1 more source
An algorithm for Prevention and Detection of Cross Site Scripting Attacks
Aqsa Afroz +3 more
openaire +1 more source
Enhanced cybersecurity threat detection using novel tri-metaheuristic loss functions in generative adversarial networks with adaptive attention preservation for network traffic augmentation. [PDF]
Khalil HM, Elrefaiy A, Elbaz M, Loey M.
europepmc +1 more source

