Results 91 to 100 of about 185,090 (283)

Who and what retrospective risk assessments miss: Examining retrospective denial of momentary suicidal ideation in adolescents

open access: yesJCPP Advances, EarlyView.
Abstract Background Emerging evidence indicates that real‐time assessments such as ecological momentary assessment (EMA) detect individuals experiencing suicidal ideation (SI) who go undetected by retrospective assessments. However, it remains unclear for whom and why such discrepancies occur.
Ki Eun Shin   +2 more
wiley   +1 more source

Evaluating Student Communication Skills in a Simulation Setting: A Trends Analysis

open access: yesJournal of Dental Education, EarlyView.
ABSTRACT Objective This study aims to comprehensively evaluate the communication skills of dental students at the University of Colorado over a 7‐year period (2016–2022). The study hypothesis is that communication skills will remain consistent over the 7‐year period.
Tamanna Tiwari   +6 more
wiley   +1 more source

PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks

open access: yesIEEE Access
Vehicular networks are expanding their applications for future sustainability. The reported increasing rate of data breaches through vehicular networks by Distributed Denial of Service (DDoS) type of intrusion creates concern for such networks.
Amandeep Verma   +4 more
doaj   +1 more source

Disrupting the Chain of Displaced Aggression: A Review and Agenda for Future Research

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT Displaced aggression refers to instances in which a person redirects their harm‐doing behavior from a primary to a secondary, substitute target. Since the publication of the first empirical article in 1948, there has been a noticeable surge in research referencing this theory in both management and psychology journals.
Constantin Lagios   +4 more
wiley   +1 more source

A real-time machine-learning model for detecting and mitigating DDoS attacks

open access: yesCybersecurity
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are among the most lethal cyber threats in this world, which make an online service unavailable to its legitimate users by overwhelming the service provider’s resources.
Mohammad Fathian, Alireza Seifousadati
doaj   +1 more source

Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds

open access: yesEURASIP Journal on Information Security, 2018
Distributed computing technology is widely used by Internet-based business applications. Supply chain management (SCM), customer relationship management (CRM), e-Commerce, and banking are some of the applications employing distributed computing.
Jaideep Gera, Bhanu Prakash Battula
doaj   +1 more source

An Approach for Mitigating Denial of Service Attack [PDF]

open access: yes, 2013
Distributed Denial of Service (DDoS) attacks are the most common types of cyber-attack on the internet and are rapidly increasing. Denial of service/distributed denial of service attack is an explicit attempt to make a machine or a network resource ...
Chauhan, Chetan
core  

Include Me: The Role of Disability Voice in Co‐Constructing the Workplace Inclusion of People With Disabilities

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT People with disabilities (PWD) often face barriers to inclusion at work. To tackle this challenge, past research focused on the role of organizations to create more inclusive workplaces. What remains understudied, however, is the role that PWD often take themselves in shaping their inclusion experiences.
Louisa Antonia Riess   +2 more
wiley   +1 more source

Recurrent Respiratory Papillomatosis Foundation Position Statement on the Management of Adults With RRP

open access: yesThe Laryngoscope, EarlyView.
ABSTRACT Objective With regulatory approval of HPV‐specific immunotherapy for recurrent respiratory papillomatosis (RRP) and growing experience with systemic bevacizumab, a management algorithm incorporating these medical treatments is warranted. Data Sources and Methods RRP Foundation (RRPF) Key Opinion Leaders offer a proposed management algorithm ...
Simon R. Best   +17 more
wiley   +1 more source

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets [PDF]

open access: yesJournal of Advances in Computer Engineering and Technology, 2015
—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks.
Bita Amirshahi, Ali Ahangari
doaj  

Home - About - Disclaimer - Privacy