Results 61 to 70 of about 214,208 (273)

Civilian Occupational Exposure to Vapors, Gas, Dust, or Fumes and Respiratory Health Among United States Military Veterans

open access: yesAmerican Journal of Industrial Medicine, EarlyView.
ABSTRACT Background We investigated associations of self‐reported and job exposure matrix (JEM) assigned civilian occupational exposure to vapors, gas, dust, or fumes (VGDF) with respiratory symptoms among previously deployed US Veterans. Methods An interviewer‐administered questionnaire ascertained self‐reported civilian occupational VGDF exposure.
Sahra Mohazzab‐Hosseinian   +14 more
wiley   +1 more source

Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review

open access: yesCyber Security and Applications, 2023
The fast growth of the cloud computing technology has led to immense development in the public and private sectors. Cloud computing provides a high level of virtualization, massive scalability, multitenancy and elasticity. This has enabled organizations,
Syed Amma Sheik   +1 more
doaj   +1 more source

An SDN-based Approach For Defending Against Reflective DDoS Attacks

open access: yes, 2018
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps.
Erb, Benjamin   +4 more
core   +1 more source

Navigating Whiteness in Australia's Anti‐Racism Movement: A Duoethnographic Inquiry by Women of Colour Scholars

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This paper applies Critical Race Theory (CRT) to explore how whiteness operates within Australia's anti‐racism movement as a structuring force that shapes discourse, practice and policy. Despite the anti‐racism movement offering crucial spaces for resistance and reform, it remains entangled in Australia's settler‐colonial present and systemic ...
Franka Vaughan, Aish Ravi
wiley   +1 more source

How Do I Answer This? A Queer Critique of Australian Census Forms and the Reification of Cisheteronormative Families

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This paper presents a critical examination of Australia's 2021 household, individual and interviewer census forms. Using a form‐led analysis, this research scrutinises the underlying cisheteronormative logic that implicitly shapes the Census process, from data collection to distribution of findings.
Xavier Mills, Sal Clark
wiley   +1 more source

Distributed Denial of Service Detection with IPFIX Protocol

open access: yesБезопасность информационных технологий, 2011
In this article the existing methods of detecting Distributed Denial of Service attacks based on the analysis of network traffic or Netflow data is examined. Advantages and disadvantages of anomaly detection methods are listed.
M. R. Mukhtarov
doaj  

Neutrosophic Set and Machine Learning Models for Detection of DoS Attack Resilience [PDF]

open access: yesNeutrosophic Sets and Systems
Security has been a major problem in in-vehicle networks (VNs) in recent years, assaults that broadcast a deluge of packets, including Denial of Service (DoS) and Distributed Denial of Service (DDoS) assaults, might put the network at risk. Consequently,
Ahmad M. Nagm   +6 more
doaj   +1 more source

Confessions of a Poverty Researcher: My Journey Through the Foothills of Scholarship

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This paper describes the key events, experiences and ideas that influenced the author's career as a poverty researcher. He describes how his early disillusion with economics was replaced by a spark of interest in social issues and how his migration from the UK to Australia in the mid‐1970s provided the impetus to begin what became a lifetime ...
Peter Saunders
wiley   +1 more source

Performance and security testing of network applications [PDF]

open access: yes, 2013
Cieľom tejto diplomovej práce je navrhnúť a realizovať bezpečnostný test na základe skúmania odolnosti testovaného zariadenia voči pôsobeniu distribuovaného útoku odoprenia služby DDoS SYN Flood.
Matej, Michal
core  

Sitting in Many Camps—Innovative Approaches and Methods for First Nations‐Led Research Into Indigenous Peacebuilding

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT In 2021, a desktop review was conducted of published references to First Nations peoples' approaches to conflict and its management in Australia (Project Stage One), culminating in a report published in 2024. This article focuses on Project Stage Two, a complex, innovative research undertaking building on the findings of Stage One, and being ...
Helen Bishop   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy