Results 61 to 70 of about 39,171 (196)

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Child’s Play: Cooperative Gaming as a Tool of Deradicalization

open access: yesJournal for Deradicalization, 2020
Research in the field of countering violent extremism (CVE) has grown significantly in the last few decades. This research project contributes to the CVE literature by studying narratives as tools of reflections on self-identity designed intentionally ...
Aya Cooley, Skye Cooley
doaj  

Gender mainstreaming in Preventing and Countering Violent Extremism

open access: yesJournal for Deradicalization, 2022
How does gender identity factor into preventing violent extremism, and rehabilitating individuals involved with terrorist networks? This question is becoming increasingly visible in the literature on preventing and countering violent extremism (P/CVE ...
Hanna Wdzięczak
doaj  

Dealing with Frustration: A Grounded Theory Study of CVE Practitioners

open access: yesInternational Journal of Conflict and Violence, 2019
Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory ...
Orla Lehane
doaj   +1 more source

Chiral vortaic effect and neutron asymmetries at NICA

open access: yes, 2010
We study the possibility of testing experimentally signatures of P-odd effects related with the vorticity of the medium. The Chiral Vortaic Effect is generalized to the case of conserved charges different from the electric one.
Rogachevsky, Oleg   +2 more
core   +1 more source

Exploring Affordable Curative Therapy for Sickle Cell Disease in Africa: A Comprehensive Overview

open access: yesAmerican Journal of Hematology, Volume 101, Issue S1, Page 56-74, April 2026.
ABSTRACT The practical aspects of developing curative treatments for sickle cell disease (SCD) in Africa, such as gene therapy and hematopoietic stem cell transplantation, involve strengthening healthcare infrastructure, training healthcare professionals, establishing regional treatment centers, and creating national SCD programs.
Adetola A. Kassim   +2 more
wiley   +1 more source

Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data

open access: yes, 2017
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and
Edkrantz M.   +4 more
core   +1 more source

A globally consistent scaling relationship reveals stabilizing effects of dominant species in plant communities

open access: yesEcography, Volume 2026, Issue 4, April 2026.
Despite extensive research, stabilizing mechanisms in ecosystems remain uncertain. Taylor's power law (TPL) is a pervasive ecological pattern that describes how variance scales with mean abundance (σ2 = aμᵇ). While TPL has been widely studied within populations, its role across species within communities and its implications for stability remain ...
Clara Gracia   +33 more
wiley   +1 more source

ОСОБЛИВОСТІ РЕАЛІЗАЦІЇ МЕРЕЖЕВИХ АТАК ЧЕРЕЗ TCP/IP-ПРОТОКОЛИ

open access: yesКібербезпека: освіта, наука, техніка
У статті здійснено дослідження особливостей реалізації типових мережевих атак, що ґрунтуються на експлуатації уразливостей протоколів стеку TCP/IP, які є критичною інфраструктурною основою глобальної мережевої взаємодії.
Юлія Костюк   +5 more
doaj   +1 more source

Analysis of the NIST database towards the composition of vulnerabilities in attack scenarios [PDF]

open access: yes, 2008
The composition of vulnerabilities in attack scenarios has been traditionally performed based on detailed pre- and post-conditions. Although very precise, this approach is dependent on human analysis, is time consuming, and not at all scalable.
Franqueira, Virginia Nunes Leal   +1 more
core   +2 more sources

Home - About - Disclaimer - Privacy