Results 101 to 110 of about 83,968 (275)
Abstract Caste—an ascriptive social hierarchy in South Asia and its diaspora—is a globalized phenomenon. Recent caste‐based discrimination, particularly in technology companies and anti‐caste efforts to address it, has compelled academia, policy, and the technology industry to better understand contemporary mechanics of caste.
Nayana Kirasur, Britt Paris
wiley +1 more source
Research on end hopping for active network confrontation
Motivated by frequency hopping for military communication, end hopping tactic was proposed which can mitigate those threats such as DoS and eavesdrop greatly by changing the end information of port, address, timeslot, cryptographic algorithm or even ...
SHI Le-yi1, 2, JIA Chun-fu2
doaj +2 more sources
Opposing consensus science through scholarly practices: The role of claims maintenance
Abstract This study examines how three US‐based communities who oppose consensus science produce and disseminate scholarly‐like artifacts: pro‐life activists, Young Earth Creationists, and Anthropogenic Climate Crisis skeptics. Prior research shows that industry‐ or church‐backed advocacy campaigns often generate claims supported by these communities ...
Irene V. Pasquetto +3 more
wiley +1 more source
Distributed Denial of Service Detection with IPFIX Protocol
In this article the existing methods of detecting Distributed Denial of Service attacks based on the analysis of network traffic or Netflow data is examined. Advantages and disadvantages of anomaly detection methods are listed.
M. R. Mukhtarov
doaj
Leader-follower cyber secure consensus problem in cybersecurity is crucial as it directly addresses the need for secure and stable communication in a networked system, which is paramount in safeguarding against cyber threats like denial-of-service ...
Asad Khan +5 more
doaj +1 more source
Abstract Online technologies are required for accessing essential services, such as healthcare, transportation, and education. Challenges to online technology access can prevent resource‐constrained communities from connecting to these services. Human intermediaries who act in the middle space between technology and the person using the technology may ...
Marcy G. Antonio +4 more
wiley +1 more source
An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment. [PDF]
Riskhan B +6 more
europepmc +1 more source
Abstract Aims Chemical Adherence Testing (CAT) is gaining prominence as a reliable and valid clinical method to detect whether antihypertensive agents are being taken as prescribed. This study aimed to explore clinicians' attitudes and perspectives on the clinical use of CAT.
Roshan Shahab +2 more
wiley +1 more source
Development of an Internet Protocol Traceback Scheme for Denial of Service Attack Source Detection
To mitigate the challenges that Flash Event (FE) poses to IP-Traceback techniques, this paper presents an IP Traceback scheme for detecting the source of a DoS attack based on Shark Smell Optimization Algorithm (SSOA).
O. W. Salami, I. J. Umoh, E. A. Adedokun
doaj +1 more source
Zuranolone: A case study in (regulatory) rush to judgement?
Abstract Sage, in collaboration with Biogen, submitted a new drug approval for zuranolone for postpartum depression (PPD) and major depressive disorder (MDD) in December 2022. In August 2023, the US Food and Drug Administration granted approval for PPD but denied approval for MDD.
Lisa Cosgrove +4 more
wiley +1 more source

