Results 71 to 80 of about 944,819 (280)
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users [PDF]
Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream.
Abdelberi, Chaabane +6 more
core +3 more sources
Lessons Learned From a Delayed‐Start Trial of Modafinil for Freezing of Gait in Parkinson's Disease
ABSTRACT Objective Freezing of gait (FOG) in people with Parkinson's disease (PwPD) is debilitating and has limited treatments. Modafinil modulates beta/gamma band activity in the pedunculopontine nucleus (PPN), like PPN deep brain stimulation. We therefore tested the hypothesis that Modafinil would improve FOG in PwPD.
Tuhin Virmani +8 more
wiley +1 more source
HLOC: Hints-Based Geolocation Leveraging Multiple Measurement Frameworks
Geographically locating an IP address is of interest for many purposes. There are two major ways to obtain the location of an IP address: querying commercial databases or conducting latency measurements.
bottger +7 more
core +1 more source
ABSTRACT The Clinical Assessment Scale in Autoimmune Encephalitis (CASE) tracks disease severity in autoimmune encephalitis (AE), but no threshold for significant change exists. We aimed to determine the minimally clinically important difference (MCID) for CASE.
Yihui Goh +8 more
wiley +1 more source
Handover algorithm using fast DAD mechanism for hierarchical mobile IPv6
To solve the problem that the duplicate address detection (DAD) in hierarchical mobile IPv6 (HMIPv6) links too time consuming, a handover algorithm based on fast DAD mechanism for HMIPv6 was proposed.
CHEN Wei-xin +3 more
doaj +2 more sources
Distributed Dynamic Host Configuration Protocol (D2HCP)
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation ...
José Duván Márquez Díaz +3 more
doaj +1 more source
Sex Differences in Medication Discontinuation in Axial Spondyloarthritis
Objective We examined sex differences in medication discontinuation among patients with axial spondyloarthritis (axSpA) initiating tumor necrosis factor inhibitors (TNFi), interleukin‐17 inhibitors (IL‐17i), or JAK inhibitors (JAKi). Methods Using data from the Rheumatology Informatics System for Effectiveness (RISE) Registry (2003–2025), we assessed ...
Rachael Stovall +9 more
wiley +1 more source
Research of ways to improve the security of corporate networks
Objective. The article explores a way to improve the security of a corporate network by using the technique of spoofing sender addresses when forwarding packets between computers. Method.
N. F. Makhmutova +4 more
doaj +1 more source
Objective The purpose was to evaluate a biomarker score consisting of MUC5B rs35705950 promoter variant, plasma matrix metalloproteinase‐7 (MMP‐7), and serum anti–malondialdehyde‐acetaldehyde (anti‐MAA) antibody for rheumatoid arthritis (RA)–associated interstitial lung disease (ILD) risk stratification.
Kelsey Coziahr +16 more
wiley +1 more source
Peer-to-Peer Communication Across Network Address Translators
Network Address Translation (NAT) causes well-known difficulties for peer-to-peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP address.
Ford, Bryan, Kegel, Dan, Srisuresh, Pyda
core +1 more source

