Results 61 to 70 of about 39,171 (196)
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Child’s Play: Cooperative Gaming as a Tool of Deradicalization
Research in the field of countering violent extremism (CVE) has grown significantly in the last few decades. This research project contributes to the CVE literature by studying narratives as tools of reflections on self-identity designed intentionally ...
Aya Cooley, Skye Cooley
doaj
Gender mainstreaming in Preventing and Countering Violent Extremism
How does gender identity factor into preventing violent extremism, and rehabilitating individuals involved with terrorist networks? This question is becoming increasingly visible in the literature on preventing and countering violent extremism (P/CVE ...
Hanna Wdzięczak
doaj
Dealing with Frustration: A Grounded Theory Study of CVE Practitioners
Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory ...
Orla Lehane
doaj +1 more source
Chiral vortaic effect and neutron asymmetries at NICA
We study the possibility of testing experimentally signatures of P-odd effects related with the vorticity of the medium. The Chiral Vortaic Effect is generalized to the case of conserved charges different from the electric one.
Rogachevsky, Oleg +2 more
core +1 more source
Exploring Affordable Curative Therapy for Sickle Cell Disease in Africa: A Comprehensive Overview
ABSTRACT The practical aspects of developing curative treatments for sickle cell disease (SCD) in Africa, such as gene therapy and hematopoietic stem cell transplantation, involve strengthening healthcare infrastructure, training healthcare professionals, establishing regional treatment centers, and creating national SCD programs.
Adetola A. Kassim +2 more
wiley +1 more source
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and
Edkrantz M. +4 more
core +1 more source
Despite extensive research, stabilizing mechanisms in ecosystems remain uncertain. Taylor's power law (TPL) is a pervasive ecological pattern that describes how variance scales with mean abundance (σ2 = aμᵇ). While TPL has been widely studied within populations, its role across species within communities and its implications for stability remain ...
Clara Gracia +33 more
wiley +1 more source
ОСОБЛИВОСТІ РЕАЛІЗАЦІЇ МЕРЕЖЕВИХ АТАК ЧЕРЕЗ TCP/IP-ПРОТОКОЛИ
У статті здійснено дослідження особливостей реалізації типових мережевих атак, що ґрунтуються на експлуатації уразливостей протоколів стеку TCP/IP, які є критичною інфраструктурною основою глобальної мережевої взаємодії.
Юлія Костюк +5 more
doaj +1 more source
Analysis of the NIST database towards the composition of vulnerabilities in attack scenarios [PDF]
The composition of vulnerabilities in attack scenarios has been traditionally performed based on detailed pre- and post-conditions. Although very precise, this approach is dependent on human analysis, is time consuming, and not at all scalable.
Franqueira, Virginia Nunes Leal +1 more
core +2 more sources

