Results 41 to 50 of about 185,090 (283)
Self-triggered Coordination over a Shared Network under Denial-of-Service
The issue of security has become ever more prevalent in the analysis and design of cyber-physical systems. In this paper, we analyze a consensus network in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent communication among ...
De Persis, Claudio +2 more
core +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
Defending Against Denial of Service [PDF]
Civil Society currently faces significant cyber threats. At the top of the list of those threats are Denial of Service (DoS) attacks. The websites of many organizations and individuals have already come under such attacks, and the frequency of those ...
core
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell +4 more
wiley +1 more source
The rain feels different under the same umbrella: Experiences with poverty across LGBTQ subgroups
Abstract Population‐based survey data have demonstrated that LGBTQ communities report varying rates of economic insecurity, yet very little research directly assesses how pathways into and experiences with poverty look different among subgroups at the intersections of sexual orientation and gender identity (SOGI).
Bianca D. M. Wilson, Lillian Nguyen
wiley +1 more source
A SYN fl ooding attack detection approach with hierarchical policies based on self-information
The SYN flooding attack is widely used in cyber attacks because it paralyzes the network by causing the system and bandwidth resources to be exhausted. This paper proposed a self-information approach for detecting the SYN flooding attack and provided a ...
Jia-Rong Sun +2 more
doaj +1 more source
ABSTRACT In epidemiological studies, obsessive‐compulsive disorder (OCD) is robustly associated with increased risk of cardiometabolic disorders, including cardiovascular diseases, type 2 diabetes, and obesity. However, the mechanisms behind these associations are unclear. We conducted genetic correlation analyses to explore shared genetic etiology and
Robyn E. Wootton +217 more
wiley +1 more source
ABSTRACT While Australia's National Disability Insurance Scheme (NDIS) was founded on principles of choice and control, for people with significant mental health challenges (what the NDIS calls ‘psychosocial disability’) these ideals often remain elusive. Support systems continue to be fractured and in the context of ongoing policy reforms, it is vital
Joel Hollier, Jennifer Smith‐Merry
wiley +1 more source
An SDN-based Approach For Defending Against Reflective DDoS Attacks
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps.
Erb, Benjamin +4 more
core +1 more source
ABSTRACT Aboriginal and Torres Strait Islander people are the oldest living custodians in the world. However, Australian identity has been purposefully established to exclude Aboriginal and Torres Strait Islander people, contributing to systemic oppression and harmful consequences. Understanding the perspectives and experiences of Aboriginal and Torres
Jack Farrugia, Jonathan Bullen
wiley +1 more source

