Results 231 to 240 of about 3,473,454 (285)
Some of the next articles are maybe not open access.
Business Interest Representation and Legitimate European Governance
2006There is agreement in the field of European interest politics that business interests are much better represented in Brussels than other societal interests (Mazey and Richardson 1999: 121). The majority of the national and European interest groups and consultants in Brussels represent producer interests (Greenwood 1997: 101; Buholzer 1998: 13 ...
Pieter Bouwen
openaire +2 more sources
2023
There is no easy answer to the question of lawful data processing and the lawful processing of health data, especially retrospective data and tumour tissue. The chief legal resource on data protection at the EU level, the GDPR, does not specifically define the lawful processing of retrospective health data and tumour tissue.
Tunjica Petrašević, Romana Ćosić
openaire +1 more source
There is no easy answer to the question of lawful data processing and the lawful processing of health data, especially retrospective data and tumour tissue. The chief legal resource on data protection at the EU level, the GDPR, does not specifically define the lawful processing of retrospective health data and tumour tissue.
Tunjica Petrašević, Romana Ćosić
openaire +1 more source
ADMBIFA: Accurate Detection and Mitigation of Blended Interest Flooding Attacks in NDNs
International Conference on High Performance Switching and Routing, 2023The Named Data Network (NDN) is a future network architecture to transit conventional host-centric networks into data-centric networks. A routing attack, represented by Interest Flooding Attack (IFA), is a major security concern in NDNs.
Yanan Zhang, Xin-Xin Guo, M. Ma
semanticscholar +1 more source
IEEE Communications Magazine, 2021
Interest flooding attacks (IFAs) are widely regarded as being among the most harmful security risks in named data networking (NDN). Through an IFA, the attacker injects numerous Interest packets into a network to drain network resources such as bandwidth,
Guanglin Xing +7 more
semanticscholar +1 more source
Interest flooding attacks (IFAs) are widely regarded as being among the most harmful security risks in named data networking (NDN). Through an IFA, the attacker injects numerous Interest packets into a network to drain network resources such as bandwidth,
Guanglin Xing +7 more
semanticscholar +1 more source
Athletes’ rights under the World Anti-Doping Code: A legitimate public interest?
Alternative Law Journal, 2018World Anti-Doping Agency considers doping transgressions strict liability offences. Strict liability offences that restrict human rights may be morally justified where legitimate social interests outweigh the rights of individuals.
D. Goldsworthy
semanticscholar +1 more source
Public Interest and State Legitimation
2023How were state formation and early modern politics shaped by the state's proclaimed obligation to domestic welfare? Drawing on a wide range of historical scholarship and primary sources, this book demonstrates that a public interest-based discourse of state legitimation was common to early modern England, Japan, and China.
openaire +2 more sources
Ordinance Achieves Legitimate Public Interest
Journal AWWA, 1999In January 1996, the Board of Commissioners of San Juan County, Washington, adopted an ordinance prohibiting the operation of personal watercraft on all county marine waters except while engaged in interstate or foreign commerce, while under a permit issued by the county or US Coast Guard, or for emergency purposes. A group of personal watercraft users,
openaire +1 more source
Feature selection for interest flooding attack in named data networking
International Journal of Computer Applications, 2019Interest flooding attack (IFA) is one of the most severe attacks in named data networking (NDN). Due to IFA, the pending interest table (PIT) of NDN routers get filled with entries of malicious requests making it unavailable for legitimate users ...
Naveen Kumar +2 more
semanticscholar +1 more source
Self-Adjusting Share-Based Countermeasure to Interest Flooding Attack in Named Data Networking
2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2019Due to the rapid growth of Internet traffic, increasing mobility, and stronger security requirements, today's Internet shows signs of aging. To keep pace with changes and move the Internet into the future, Named Data Networking (NDN), a future Internet ...
Cong Pu +2 more
semanticscholar +1 more source
Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View
2019 IEEE First International Workshop on Network Meets Intelligent Computations (NMIC), 2019Interest Flooding Attack (IFA) is one of the main security threats for the Named Data Networking (NDN). Most of its existing countermeasures enable intermediate routers near the attackers to independently detect the attack and consider the typical attack
Guang Cheng +6 more
semanticscholar +1 more source

