Results 41 to 50 of about 214,208 (273)

Integrated Distributed Authentication Protocol for Smart Grid Communications [PDF]

open access: yes, 2018
In the smart grid, an integrated distributed authen- tication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications.
Choi, B.J., Saxena, N.
core   +3 more sources

Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences, 2019
Distributed Denial of Service (DDoS) attack harms the digital availability in Internet. The user’s perspective of getting quick and effective services may be badly hit by the DDoS attackers.
Rajeev Singh, T. P. Sharma
doaj   +1 more source

Assessing Cognitive Functioning in Children With Brain Tumors: Interaction of Neighborhood Social Determinants of Health and Neurological Risk

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich   +5 more
wiley   +1 more source

An Overview of Distributed Denial of Service Traffic Detection Approaches

open access: yesPromet (Zagreb), 2019
The availability of information and communication (IC) resources is a growing problem caused by the increase in the number of users, IC services, and the capacity constraints.
Ivan Cvitić   +3 more
doaj   +1 more source

Defending Against Denial of Service [PDF]

open access: yes, 2012
Civil Society currently faces significant cyber threats. At the top of the list of those threats are Denial of Service (DoS) attacks. The websites of many organizations and individuals have already come under such attacks, and the frequency of those ...

core  

Clinical Practice Guideline for Evaluation and Management of Peripheral Nervous System Manifestations in Sjögren's Disease

open access: yesArthritis Care &Research, EarlyView.
Objective Sjögren's disease is an autoimmune disorder that can impact multiple organ systems, including the peripheral nervous system (PNS). PNS manifestations, which can exist concurrently, include mononeuropathies, polyneuropathies, and autonomic nervous system neuropathies.
Anahita Deboo   +88 more
wiley   +1 more source

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

Exploring the Impact of Meat Alternative Labeling Regulations on the U.S. Meat Consumption Patterns

open access: yesAgribusiness, EarlyView.
ABSTRACT The global demand for conventional meat continues to rise, but it is also associated with substantial environmental and health challenges. In response, meat alternatives have gained popularity, sparking debates over meat alternative labeling regulations. This study investigates the effects of meat alternative labeling regulations in the United
Jeong Hun Ji, Sang Hyeon Lee
wiley   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

IoT Botnets Analysis [PDF]

open access: yes, 2017
A botnet is a set of connected devices which have been infected with malware that allows an attacker to gain remote control and coordinate their actions. Attackers most commonly use their botnets to launch DDoS (Distributed Denial of Service) attacks
Dushenok, M. S.   +2 more
core  

Home - About - Disclaimer - Privacy