Results 41 to 50 of about 83,968 (275)

Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks [PDF]

open access: yes, 2013
In this paper we present a new kind of Denial-of-Service attack against the PHY layer of low power wireless sensor networks. Overcoming the very limited range of jamming-based attacks, this attack can penetrate deep into a target network with high power ...
He, Zhitao, Voigt, Thiemo
core   +2 more sources

Clinical Practice Guideline for Evaluation and Management of Peripheral Nervous System Manifestations in Sjögren's Disease

open access: yesArthritis Care &Research, EarlyView.
Objective Sjögren's disease is an autoimmune disorder that can impact multiple organ systems, including the peripheral nervous system (PNS). PNS manifestations, which can exist concurrently, include mononeuropathies, polyneuropathies, and autonomic nervous system neuropathies.
Anahita Deboo   +88 more
wiley   +1 more source

Exploring the Impact of Meat Alternative Labeling Regulations on the U.S. Meat Consumption Patterns

open access: yesAgribusiness, EarlyView.
ABSTRACT The global demand for conventional meat continues to rise, but it is also associated with substantial environmental and health challenges. In response, meat alternatives have gained popularity, sparking debates over meat alternative labeling regulations. This study investigates the effects of meat alternative labeling regulations in the United
Jeong Hun Ji, Sang Hyeon Lee
wiley   +1 more source

A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS

open access: yesTạp chí Khoa học
Denial-of-service (DoS) attacks on website systems have become increasingly sophisticated. These attacks are evolving at a pace and complexity that outstrips the capabilities of current defensive measures.
Vu Thi Phuong*, Nguyen Van Vu, Dang Thi Hien
doaj   +1 more source

Visualisasi Serangan Denial Of Service dengan Clustering Menggunakan K-Means Algorithm [PDF]

open access: yes, 2016
Visualisasi menjadi salah satu solusi dalam menampilkan serangan di network. Dengan memvisulisasikan serangan, akan lebih mudah dalam mengenali dan menyimpulkan pola dari gambar visual yang komplek.
napsiah, N. (napsiah)
core  

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

Artificial Intelligence in Autonomous Mobile Robot Navigation: From Classical Approaches to Intelligent Adaptation

open access: yesAdvanced Intelligent Systems, EarlyView.
Artificial intelligence (AI) is reshaping autonomous mobile robot navigation beyond classical pipelines. This review analyzes how AI techniques are integrated into core navigation tasks, including path planning and control, localization and mapping, perception, and context‐aware decision‐making. Learning‐based, probabilistic, and soft‐computing methods
Giovanna Guaragnella   +5 more
wiley   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Automatic proof of resistance of denial of service attacks in protocols

open access: yesTongxin xuebao, 2012
First,the applied PI calculus was extended from two aspects:attacker contexts and process expression,then from the view of protocol state,the protocols were modeled with the extended applied PI calculus and a automatic method of proof of resistance of ...
Bo MENG   +3 more
doaj   +2 more sources

On Resilient Control of Nonlinear Systems under Denial-of-Service

open access: yes, 2014
We analyze and design a control strategy for nonlinear systems under Denial-of-Service attacks. Based on an ISS-Lyapunov function analysis, we provide a characterization of the maximal percentage of time during which feedback information can be lost ...
De Persis, Claudio, Tesi, Pietro
core   +1 more source

Home - About - Disclaimer - Privacy