Results 51 to 60 of about 83,968 (275)
Abstract Germany's Renewable Energy Sources Act (REA), enacted in 2000 and subsequently amended, subsidized national renewable energy production with fixed feed‐in tariffs for renewable energy sources (RE) from wind, solar, and biogas. Empirical studies suggest that the policy was creating windfall effects for landowners and attribute farmland use ...
Lars Isenhardt +6 more
wiley +1 more source
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell +4 more
wiley +1 more source
Distributed Denial of Service Attack Detection by Expert Systems [PDF]
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi +1 more
doaj +1 more source
Machine Learning-Based DoS Amplification Attack Detection against Constrained Application Protocol
This paper discusses the Internet of Things (IoT) and the security challenges associated with it. IoT is a network of interconnected devices that share information.
Sultan M. Almeghlef +3 more
doaj +1 more source
Entanglement Verification in Quantum Networks with Tampered Nodes
In this paper, we consider the problem of entanglement verification across the quantum memories of any two nodes of a quantum network. Its solution can be a means for detecting (albeit not preventing) the presence of intruders that have taken full ...
Amoretti, Michele, Carretta, Stefano
core +1 more source
The rain feels different under the same umbrella: Experiences with poverty across LGBTQ subgroups
Abstract Population‐based survey data have demonstrated that LGBTQ communities report varying rates of economic insecurity, yet very little research directly assesses how pathways into and experiences with poverty look different among subgroups at the intersections of sexual orientation and gender identity (SOGI).
Bianca D. M. Wilson, Lillian Nguyen
wiley +1 more source
Analisis Explotasi Keamanan Web Denial of Service Attack
Internet network which is public and global is unsafe, so the security of public Internet-based information system needs to be considered. When a data is sent from one computer to another on the Internet, it will pass through a number of other computers
Junita Juwita Siregar
doaj +1 more source
Self-triggered Coordination over a Shared Network under Denial-of-Service
The issue of security has become ever more prevalent in the analysis and design of cyber-physical systems. In this paper, we analyze a consensus network in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent communication among ...
De Persis, Claudio +2 more
core +1 more source
Racism and racial disparities in firearm violence: A scoping review
Abstract Firearm violence (i.e., interpersonal, police firearm violence) disproportionately affects racially minoritized communities. Researchers recently shifted their focus from race to racism to better understand the factors that contribute to racial disparities in firearm violence.
Daniel B. Lee +8 more
wiley +1 more source
Denial of service attacks and challenges in broadband wireless networks [PDF]
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN).
Khan, MA, Khan, S, Loo, KK, Naeem, T
core +1 more source

