Results 11 to 20 of about 21,312 (223)
As the nature of trafficking in persons continues to manifest itself in myriad ways all over the world, interpretation of the UN Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children (Trafficking Protocol), should
Mogos O Brhane
doaj +2 more sources
Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators [PDF]
Consensus algorithms facilitate agreement on and resolution of blockchain functions, such as smart contracts and transactions. Ethereum uses a Proof-of-Stake (PoS) consensus mechanism, which depends on financial incentives to ensure that validators ...
Alpesh Bhudia +4 more
semanticscholar +1 more source
Cashing out crypto: state of practice in ransom payments
The fast pace of blockchain technology and cryptocurrencies’ evolution makes people vulnerable to financial fraud and provides a relatively straightforward monetisation mechanism for cybercriminals, in particular ransomware groups which exploit crypto’s ...
C. Patsakis +3 more
semanticscholar +1 more source
Ransomware Economics: A Two-Step Approach To Model Ransom Paid
Ransomware poses a significant and pressing challenge in today's society. Mitigation efforts aim to reduce the profitability of ransomware attacks. Nevertheless, limited research has analysed factors that influence the size of ransom and willingness of ...
Tom Meurs +6 more
semanticscholar +1 more source
In recent years, ransomware attacks have led to disastrous consequences for victims, not just due to the payment ransom amount but also due to the recovery costs associated with these attacks.
Tom Meurs +3 more
semanticscholar +1 more source
Serendipitous compound action potential oscillations reveal glycolytic astrocyte and oxidative axon interstitial K<sup>+</sup> buffering in central white matter. [PDF]
Abstract The principal processes that govern interstitial K+ ([K+]o) buffering in mouse optic nerve (MON), a central white matter tract, either directly consume energy (Na+–K+‐ATPase) or use transmembrane ion gradients created by energy‐dependent pumps to enable the K+ fluxes that maintain a stable [K+]o, and thus ready availability of utilisable ...
Hopper AJ, Brown AM.
europepmc +2 more sources
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Research into various aspects of slavery and the related conversions has multiplied in recent years. This contribution investigates the case of Fatima, a young woman belonging to the Turkish–Algerian elite, who was captured in 1608 by the Tuscan Knights ...
Bruno Pomara Saverino
doaj +1 more source
Femmes dans la guerre (XIVe-XVe siècles) : un rôle caché par les sources ?
Numerous stories, revealing women who counted as the first victims of war, may hide some isolated cases of women who actively took part in the war by, e.g.
Adrien Dubois
doaj +1 more source
At the height of Roman imperialism, military victories brought in several millions of captives. Available figures show an increasing number of prisoners during the second half of the third century B.C. and until the first century B.C.
Jean-Christophe Robert
doaj +1 more source

