Results 41 to 50 of about 503,301 (280)

Distributed Denial of Service is a Scalability Problem

open access: yes, 2011
Distributed denial of service attacks are often considered a security problem. While this may be the way to view the problem with today's Internet, new network architectures attempting to address the issue should view it as a scalability problem.
Chung, Yoo
core   +1 more source

Cutaneous Melanoma Drives Metabolic Changes in the Aged Bone Marrow Immune Microenvironment

open access: yesAging and Cancer, EarlyView.
Melanoma, the deadliest form of skin cancer, increasingly affects older adults. Our study reveals that melanoma induces changes in iron and lipid levels in the bone marrow, impacting immune cell populations and increasing susceptibility to ferroptosis.
Alexis E. Carey   +12 more
wiley   +1 more source

Re‐Awakening Public Attention to the Silent Pandemic of Cancer Among Older Adults in Low‐ and Middle‐Income Countries

open access: yesAging and Cancer, EarlyView.
ABSTRACT As global populations age, cancer is increasingly becoming a leading cause of morbidity and mortality among older adults, particularly in low‐ and middle‐income countries (LMICs). Despite accounting for the majority of new cancer cases and deaths, older individuals remain underrepresented in cancer research, clinical guidelines, and health ...
Ibrahim Bidemi Abdullateef   +2 more
wiley   +1 more source

A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS

open access: yesTạp chí Khoa học
Denial-of-service (DoS) attacks on website systems have become increasingly sophisticated. These attacks are evolving at a pace and complexity that outstrips the capabilities of current defensive measures.
Vu Thi Phuong*, Nguyen Van Vu, Dang Thi Hien
doaj   +1 more source

Visualisasi Serangan Denial Of Service dengan Clustering Menggunakan K-Means Algorithm [PDF]

open access: yes, 2016
Visualisasi menjadi salah satu solusi dalam menampilkan serangan di network. Dengan memvisulisasikan serangan, akan lebih mudah dalam mengenali dan menyimpulkan pola dari gambar visual yang komplek.
napsiah, N. (napsiah)
core  

Clinical Practice Guideline for Evaluation and Management of Peripheral Nervous System Manifestations in Sjögren's Disease

open access: yesArthritis Care &Research, EarlyView.
Objective Sjögren's disease is an autoimmune disorder that can impact multiple organ systems, including the peripheral nervous system (PNS). PNS manifestations, which can exist concurrently, include mononeuropathies, polyneuropathies, and autonomic nervous system neuropathies.
Anahita Deboo   +88 more
wiley   +1 more source

On Resilient Control of Nonlinear Systems under Denial-of-Service

open access: yes, 2014
We analyze and design a control strategy for nonlinear systems under Denial-of-Service attacks. Based on an ISS-Lyapunov function analysis, we provide a characterization of the maximal percentage of time during which feedback information can be lost ...
De Persis, Claudio, Tesi, Pietro
core   +1 more source

Exploring the Impact of Meat Alternative Labeling Regulations on the U.S. Meat Consumption Patterns

open access: yesAgribusiness, EarlyView.
ABSTRACT The global demand for conventional meat continues to rise, but it is also associated with substantial environmental and health challenges. In response, meat alternatives have gained popularity, sparking debates over meat alternative labeling regulations. This study investigates the effects of meat alternative labeling regulations in the United
Jeong Hun Ji, Sang Hyeon Lee
wiley   +1 more source

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

Telephony Denial of Service Defense at Data Plane (TDoSD@DP) [PDF]

open access: yes, 2018
The Session Initiation Protocol (SIP) is an application-layer control protocol used to establish and terminate calls that are deployed globally. A flood of SIP INVITE packets sent by an attacker causes a Telephony Denial of Service (TDoS) incident ...
Febro, Aldo   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy