Results 11 to 20 of about 21,312 (223)

Trafficking in Persons for Ransom and the Need to Expand the Interpretation of Article 3 of the UN Trafficking Protocol

open access: yesAnti-Trafficking Review, 2015
As the nature of trafficking in persons continues to manifest itself in myriad ways all over the world, interpretation of the UN Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children (Trafficking Protocol), should
Mogos O Brhane
doaj   +2 more sources

Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators [PDF]

open access: yesARES, 2023
Consensus algorithms facilitate agreement on and resolution of blockchain functions, such as smart contracts and transactions. Ethereum uses a Proof-of-Stake (PoS) consensus mechanism, which depends on financial incentives to ensure that validators ...
Alpesh Bhudia   +4 more
semanticscholar   +1 more source

Cashing out crypto: state of practice in ransom payments

open access: yesInternational Journal of Information Security, 2023
The fast pace of blockchain technology and cryptocurrencies’ evolution makes people vulnerable to financial fraud and provides a relatively straightforward monetisation mechanism for cybercriminals, in particular ransomware groups which exploit crypto’s ...
C. Patsakis   +3 more
semanticscholar   +1 more source

Ransomware Economics: A Two-Step Approach To Model Ransom Paid

open access: yesAPWG Symposium on Electronic Crime Research, 2023
Ransomware poses a significant and pressing challenge in today's society. Mitigation efforts aim to reduce the profitability of ransomware attacks. Nevertheless, limited research has analysed factors that influence the size of ransom and willingness of ...
Tom Meurs   +6 more
semanticscholar   +1 more source

Ransomware: How attacker’s effort, victim characteristics and context influence ransom requested, payment and financial loss

open access: yesAPWG Symposium on Electronic Crime Research, 2022
In recent years, ransomware attacks have led to disastrous consequences for victims, not just due to the payment ransom amount but also due to the recovery costs associated with these attacks.
Tom Meurs   +3 more
semanticscholar   +1 more source

Serendipitous compound action potential oscillations reveal glycolytic astrocyte and oxidative axon interstitial K<sup>+</sup> buffering in central white matter. [PDF]

open access: yesExp Physiol
Abstract The principal processes that govern interstitial K+ ([K+]o) buffering in mouse optic nerve (MON), a central white matter tract, either directly consume energy (Na+–K+‐ATPase) or use transmembrane ion gradients created by energy‐dependent pumps to enable the K+ fluxes that maintain a stable [K+]o, and thus ready availability of utilisable ...
Hopper AJ, Brown AM.
europepmc   +2 more sources

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

The Lonely Girl. External Factors in the Conversion and Failed Ransom of the Turkish–Algerian Fatima (1608–1622)

open access: yesReligions, 2023
Research into various aspects of slavery and the related conversions has multiplied in recent years. This contribution investigates the case of Fatima, a young woman belonging to the Turkish–Algerian elite, who was captured in 1608 by the Tuscan Knights ...
Bruno Pomara Saverino
doaj   +1 more source

Femmes dans la guerre (XIVe-XVe siècles) : un rôle caché par les sources ?

open access: yesTabularia, 2004
Numerous stories, revealing women who counted as the first victims of war, may hide some isolated cases of women who actively took part in the war by, e.g.
Adrien Dubois
doaj   +1 more source

Vente et rançonnement du butin humain des armées romaines à l’époque des conquêtes (264 av. J.-C. – 117 ap. J.-C.)

open access: yesLes Cahiers de Framespa, 2014
At the height of Roman imperialism, military victories brought in several millions of captives. Available figures show an increasing number of prisoners during the second half of the third century B.C. and until the first century B.C.
Jean-Christophe Robert
doaj   +1 more source

Home - About - Disclaimer - Privacy