Results 101 to 110 of about 185,090 (283)

Islamic Public Administration in Practice: The Taliban's “Gender Apartheid” Governance in Afghanistan

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT This article analyzes the Taliban's post‐2021 governance model through the Islamic Public Administration (IPA) framework, focusing on justice, equality, and women's inclusion. It asks: (1) How does the Taliban's governance align with core IPA principles?
Parwiz Mosamim   +1 more
wiley   +1 more source

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS [PDF]

open access: yesICTACT Journal on Communication Technology, 2010
Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service) attacks stealthy and difficult to counter.
S.Seetha, P.Raviraj
doaj  

A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

open access: yesSensors, 2016
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and ...
João José Costa Gondim   +4 more
doaj   +1 more source

RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks. [PDF]

open access: yesSensors (Basel), 2023
Shawky MA   +7 more
europepmc   +1 more source

More than proteins for empty stomachs: Wild meat in the BaTonga food system

open access: yesPeople and Nature, EarlyView.
Abstract Our paper highlights the limitations of the framework used by many conservation‐focused programmes that incorporate food security objectives. This framework encourages the substitution of wild proteins with domestic proteins by promoting animal farming in communities located near conservation areas.
Muriel Figuié   +5 more
wiley   +1 more source

Enforcing environmental law in the Amazon

open access: yesPeople and Nature, EarlyView.
Abstract This article identifies the underlying obstacles to enforcement of laws against environmental crimes such as illegal logging, mining and ranching. With four departments (provinces) from Colombia as case studies, it assesses enforcement of the country's main environmental law, Law 2111, which is one of Latin America's strongest. The article has
Mark Ungar, Juan Corredor‐Garcia
wiley   +1 more source

Cyber secure consensus of fractional order multi-agent systems with distributed delays: Defense strategy against denial-of-service attacks

open access: yesAin Shams Engineering Journal
Leader-follower cyber secure consensus problem in cybersecurity is crucial as it directly addresses the need for secure and stable communication in a networked system, which is paramount in safeguarding against cyber threats like denial-of-service ...
Asad Khan   +5 more
doaj   +1 more source

ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning. [PDF]

open access: yesSensors (Basel), 2023
Hernandez-Suarez A   +8 more
europepmc   +1 more source

Combining dance movement therapy and pharmacotherapy in adolescents with major depressive disorder: A randomized controlled study

open access: yesPediatric Investigation, EarlyView.
The current study was among the first clinical trials that combined dance movement therapy (DMT) and pharmacotherapy to enhance self‐esteem and alleviate anxious and depressive symptoms in adolescents with major depressive disorder. Results indicated that DMT combined with pharmacotherapy improved depression symptoms more than pharmacotherapy alone ...
Yanru Liu   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy