Results 81 to 90 of about 185,090 (283)
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Distributed Denial of Service Detection with IPFIX Protocol
In this article the existing methods of detecting Distributed Denial of Service attacks based on the analysis of network traffic or Netflow data is examined. Advantages and disadvantages of anomaly detection methods are listed.
M. R. Mukhtarov
doaj
Tree-based Intelligent Intrusion Detection System in Internet of Vehicles
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail +3 more
core +1 more source
Keeping their powder dry: Purity, pollution, and handgun ownership among Jewish women in Israel
Abstract This article examines the gendered practices through which Jewish women in Israel experience and negotiate personal handgun ownership in everyday life. Drawing on interviews, participant observation in gun‐related spaces, and analysis of women‐only online forums, we explore the expanding participation of Jewish women in civilian gun ownership,
Maya Maor +3 more
wiley +1 more source
Maternal and neonatal outcomes in Gaza amid armed hostilities in 2025
Abstract Objective This study documents facility‐based maternal, obstetric, and neonatal outcomes and associated conflict‐related exposures and living conditions among pregnancy‐related encounters at Al‐Helou Maternity Hospital in Gaza from late April to early September 2025, with a small number of additional encounters recorded at Al‐Shifa Medical ...
Shaymaa Abuhaiba +16 more
wiley +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Engagement With Online Sexual Trauma‐Related Content Among Women Who Have Experienced Sexual Trauma
ABSTRACT Seeking online social support has become increasingly common due to widespread use of social media; however, little is known about the experiences of women survivors of sexual trauma who engage with online sexual trauma‐related content and whether this has implications for physical and mental health.
Caterina Obenauf +3 more
wiley +1 more source
Considered distributed delay control strategy for Leader-Following cyber secure consensus in Riemann–Liouville fractional-order delayed Multi-Agent system under Denial-of-Service Attacks, where the associated topology is a switching weighted digraph.
José Roberto Castilho Piqueira +3 more
doaj +1 more source
Business and social evaluation of denial of service attacks in view of scaling economic counter-measures [PDF]
This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks.
Pau, Louis-François
core +1 more source
Performance and security testing of network applications [PDF]
Cieľom tejto diplomovej práce je navrhnúť a realizovať bezpečnostný test na základe skúmania odolnosti testovaného zariadenia voči pôsobeniu distribuovaného útoku odoprenia služby DDoS SYN Flood.
Matej, Michal
core

