Results 51 to 60 of about 83,968 (275)

Uncovering renewable energy policy impact channels on land values, the local farm structure, and farmland heterogeneity

open access: yesAmerican Journal of Agricultural Economics, EarlyView.
Abstract Germany's Renewable Energy Sources Act (REA), enacted in 2000 and subsequently amended, subsidized national renewable energy production with fixed feed‐in tariffs for renewable energy sources (RE) from wind, solar, and biogas. Empirical studies suggest that the policy was creating windfall effects for landowners and attribute farmland use ...
Lars Isenhardt   +6 more
wiley   +1 more source

“Will you be there for me?” Social support from family and friends during cold case sexual assault prosecutions

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell   +4 more
wiley   +1 more source

Distributed Denial of Service Attack Detection by Expert Systems [PDF]

open access: yesمطالعات مدیریت کسب و کار هوشمند, 2016
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi   +1 more
doaj   +1 more source

Machine Learning-Based DoS Amplification Attack Detection against Constrained Application Protocol

open access: yesApplied Sciences, 2023
This paper discusses the Internet of Things (IoT) and the security challenges associated with it. IoT is a network of interconnected devices that share information.
Sultan M. Almeghlef   +3 more
doaj   +1 more source

Entanglement Verification in Quantum Networks with Tampered Nodes

open access: yes, 2020
In this paper, we consider the problem of entanglement verification across the quantum memories of any two nodes of a quantum network. Its solution can be a means for detecting (albeit not preventing) the presence of intruders that have taken full ...
Amoretti, Michele, Carretta, Stefano
core   +1 more source

The rain feels different under the same umbrella: Experiences with poverty across LGBTQ subgroups

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract Population‐based survey data have demonstrated that LGBTQ communities report varying rates of economic insecurity, yet very little research directly assesses how pathways into and experiences with poverty look different among subgroups at the intersections of sexual orientation and gender identity (SOGI).
Bianca D. M. Wilson, Lillian Nguyen
wiley   +1 more source

Analisis Explotasi Keamanan Web Denial of Service Attack

open access: yesComTech, 2013
Internet network which is public and global is unsafe, so the security of public Internet-based information system needs to be considered. When a data is sent from one computer to another on the Internet, it will pass through a number of other computers
Junita Juwita Siregar
doaj   +1 more source

Self-triggered Coordination over a Shared Network under Denial-of-Service

open access: yes, 2015
The issue of security has become ever more prevalent in the analysis and design of cyber-physical systems. In this paper, we analyze a consensus network in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent communication among ...
De Persis, Claudio   +2 more
core   +1 more source

Racism and racial disparities in firearm violence: A scoping review

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract Firearm violence (i.e., interpersonal, police firearm violence) disproportionately affects racially minoritized communities. Researchers recently shifted their focus from race to racism to better understand the factors that contribute to racial disparities in firearm violence.
Daniel B. Lee   +8 more
wiley   +1 more source

Denial of service attacks and challenges in broadband wireless networks [PDF]

open access: yes, 2008
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN).
Khan, MA, Khan, S, Loo, KK, Naeem, T
core   +1 more source

Home - About - Disclaimer - Privacy