Results 51 to 60 of about 503,301 (280)
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
Automatic proof of resistance of denial of service attacks in protocols
First,the applied PI calculus was extended from two aspects:attacker contexts and process expression,then from the view of protocol state,the protocols were modeled with the extended applied PI calculus and a automatic method of proof of resistance of ...
Bo MENG +3 more
doaj +2 more sources
Distributed Denial of Service Attack Detection by Expert Systems [PDF]
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi +1 more
doaj +1 more source
Denial-of-Service Attacks on LoRaWAN [PDF]
LoRaWAN is the dominant protocol for communication in low-power Wide Area Networks in several European countries, and is being used increasingly in other parts of the world. We identified three vulnerabilities in the LoRaWAN protocol specification that can be used for launching Denial-of-Service (DoS) attacks against end-devices in a LoRaWAN network ...
Eef van Es +2 more
openaire +2 more sources
Abstract Germany's Renewable Energy Sources Act (REA), enacted in 2000 and subsequently amended, subsidized national renewable energy production with fixed feed‐in tariffs for renewable energy sources (RE) from wind, solar, and biogas. Empirical studies suggest that the policy was creating windfall effects for landowners and attribute farmland use ...
Lars Isenhardt +6 more
wiley +1 more source
Analisis Explotasi Keamanan Web Denial of Service Attack
Internet network which is public and global is unsafe, so the security of public Internet-based information system needs to be considered. When a data is sent from one computer to another on the Internet, it will pass through a number of other computers
Junita Juwita Siregar
doaj +1 more source
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell +4 more
wiley +1 more source
The rain feels different under the same umbrella: Experiences with poverty across LGBTQ subgroups
Abstract Population‐based survey data have demonstrated that LGBTQ communities report varying rates of economic insecurity, yet very little research directly assesses how pathways into and experiences with poverty look different among subgroups at the intersections of sexual orientation and gender identity (SOGI).
Bianca D. M. Wilson, Lillian Nguyen
wiley +1 more source
Racism and racial disparities in firearm violence: A scoping review
Abstract Firearm violence (i.e., interpersonal, police firearm violence) disproportionately affects racially minoritized communities. Researchers recently shifted their focus from race to racism to better understand the factors that contribute to racial disparities in firearm violence.
Daniel B. Lee +8 more
wiley +1 more source
The psychosocial toll of Dublin III on asylum seekers in the Netherlands
Abstract The Dublin III Regulation determines which EU Member State is responsible for examining asylum claims, but its implementation carries significant consequences for those subjected to it. This study examines how Dublin III, as implemented in the Netherlands, affects asylum seekers' psychosocial wellbeing using Silove′s Adaptation and Development
Imen El Amouri
wiley +1 more source

