Results 71 to 80 of about 185,090 (283)

Sudan at War With Itself: Civilian Devastation in the Civil War

open access: yesConflict Resolution Quarterly, EarlyView.
ABSTRACT A civil war is raging in Sudan between the Sudan Armed Forces (SAF) and the Rapid Support Forces (RSF) along with militia groups. Beginning on April 15, 2023, and continuing at least to this writing (October 15, 2025), civilian noncombatants have been subjected to bombings, beatings, torture, shootings, rape, and murder on a large scale. Since
Daniel Rothbart   +3 more
wiley   +1 more source

On Resilient Control of Nonlinear Systems under Denial-of-Service

open access: yes, 2014
We analyze and design a control strategy for nonlinear systems under Denial-of-Service attacks. Based on an ISS-Lyapunov function analysis, we provide a characterization of the maximal percentage of time during which feedback information can be lost ...
De Persis, Claudio, Tesi, Pietro
core   +1 more source

Denial of Service Attack in Cooperative Networks

open access: yesCoRR, 2018
Cooperative relaying and DoS ...
Tauseef Jamal   +3 more
openaire   +2 more sources

Effectiveness and detection of denial-of-service attacks in tor [PDF]

open access: yesACM Transactions on Information and System Security, 2012
Tor is one of the more popular systems for anonymizing near-real-time communications on the Internet. Borisov et al. [2007] proposed a denial-of-service-based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided.
Norman Danner   +3 more
openaire   +2 more sources

National Identity Meaning and Attitudes Toward War, Peace, and the Future of Ukraine

open access: yesConflict Resolution Quarterly, EarlyView.
ABSTRACT The link between attitudes and social identity is complex, influencing perceptions, motivations, and actions. Social psychological research mainly focused on the role of attitude in identity formation, particularly in the contexts of social movements and collective action.
Karina V. Korostelina   +6 more
wiley   +1 more source

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

Genetic testing for familial epilepsies: Diagnostic yield and genetic findings

open access: yesEpilepsia, EarlyView.
Abstract Objective Genetic testing has become a routine part of clinical epilepsy care. Family history is an indication for genetic testing, but the diagnostic yield, predictors of a genetic diagnosis, and association with familial patterns are not well understood.
Colin A. Ellis   +27 more
wiley   +1 more source

On the Efficacy of Live DDoS Detection with Hadoop

open access: yes, 2015
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core   +1 more source

Expanding the scope of pediatric epilepsy surgery: Access, indications, and outcomes in a modern cohort

open access: yesEpilepsia Open, EarlyView.
Abstract Objective Expanded indications, diagnostic tools, and treatment options have transformed the landscape of modern pediatric epilepsy surgery. Published real‐world experiences from large surgical cohorts are still needed. To close this gap, we evaluated access, indications, treatment, and outcomes in a contemporary pediatric epilepsy surgery ...
John R. McLaren   +12 more
wiley   +1 more source

Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks [PDF]

open access: yes, 2008
Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter.
Anwar, Zahid   +5 more
core  

Home - About - Disclaimer - Privacy