Results 221 to 230 of about 503,301 (280)
ABSTRACT Although objectification is prevalent in leadership relations, little is known about (a) why some supervisors objectify their employees to a greater extent than others and (b) when and how such objectification manifests in a supervisor's leadership behavior.
Katerina Tsantila, Frank Walter
wiley +1 more source
Adaptive frequency-domain CFAR for robust spectrum sensing under jamming and administrator-controlled counter-access. [PDF]
Shams MS +3 more
europepmc +1 more source
Cybersecurity breaches in medical devices: analyzing FDA safety communications in response to patient security concerns. [PDF]
Menon V.
europepmc +1 more source
Optimizing Health Insurance Claims Processing: The Role of Clinical Documentation Improvement (CDI). [PDF]
Alumran A +5 more
europepmc +1 more source
Medicare advantage becoming a disadvantage with use of artificial intelligence in prior authorization review. [PDF]
Raza S +4 more
europepmc +1 more source
Perceived parenting styles and chronic pain course in mid-life in the general population. [PDF]
Rouch I +8 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A denial of service but not a denial of justice
Computer Law & Security Report, 2006Abstract There has been a great deal of concern that the Computer Misuse Act 1990 has been unable to keep pace with the development of the internet and is ineffective against new forms of cyber-crime, such as denial of service attacks. This case note considers the judgment of the Divisional Court in Director of Public Prosecutions v.
Georgina Kon, Peter Church
openaire +1 more source
Denial of service or denial of security?
Proceedings of the 14th ACM conference on Computer and communications security, 2007We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the Hydra-Onion and Cashmere systems that aim to offer reliable mixing, and Salsa, a peer-to-peer anonymous communication network.
Nikita Borisov +3 more
openaire +1 more source
Analysis of denial-of-service attacks on denial-of-service defensive measures
GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2004Currently, denial-of-service (DoS) attacks remain among the most critical threats on the Internet. Ironically, although a major objective of Internet protocol design was to prevent DoS attacks and to maintain network connections in order to provide essential services to the masses uninterruptedly, the Internet is suffering significantly from ...
Bao-Tung Wang, Henning Schulzrinne
openaire +1 more source

