Results 11 to 20 of about 135,312 (231)
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Thorkelin y el Beowulf / Thorkelin and Beowulf [PDF]
An edition and translation of an unpublished essay by Jorge Luis Borges on the modern rediscovery of the Beowulf manuscript.
Joseph Stadolnik
core +1 more source
Research into various aspects of slavery and the related conversions has multiplied in recent years. This contribution investigates the case of Fatima, a young woman belonging to the Turkish–Algerian elite, who was captured in 1608 by the Tuscan Knights ...
Bruno Pomara Saverino
doaj +1 more source
Femmes dans la guerre (XIVe-XVe siècles) : un rôle caché par les sources ?
Numerous stories, revealing women who counted as the first victims of war, may hide some isolated cases of women who actively took part in the war by, e.g.
Adrien Dubois
doaj +1 more source
To pay or not: game theoretic models of ransomware [PDF]
Ransomware is a type of malware that encrypts files and demands a ransom from victims. It can be viewed as a form of kidnapping in which the criminal takes control of the victim’s files with the objective of financial gain. In this article, we review and
August +38 more
core +1 more source
Ransomware and reputation [PDF]
open access articleRansomware is a particular form of cyber-attack in which a victim loses access to either his electronic device or files unless he pays a ransom to criminals.
Anna Cartwright +8 more
core +2 more sources
“Robin Hook”: The developmental effects of Somali piracy [PDF]
Copyright @ 2011 Brunel UniversityNaval counter-piracy measures off Somalia have failed to change the incentives for pirates, raising calls for land-based approaches that may involve replacing piracy as a source of income.
Shortland, A
core +2 more sources
At the height of Roman imperialism, military victories brought in several millions of captives. Available figures show an increasing number of prisoners during the second half of the third century B.C. and until the first century B.C.
Jean-Christophe Robert
doaj +1 more source
Finding (or not) New Gamma-ray Pulsars with GLAST [PDF]
Young energetic pulsars will likely be the largest class of Galactic sources observed by GLAST, with many hundreds detected. Many will be unknown as radio pulsars, making pulsation detection dependent on radio and/or x-ray observations or on blind ...
Ransom, Scott M.
core +2 more sources
TAX AMNESTY: WHY IS IT BEHAVIOR COMPLIANCE?
The main purpose of this paper is to discuss and describe the factors causing taxpayers not to comply with tax obligations in accordance with Law of the Republic of Indonesia Number 11 the Year 2016 regarding tax Amnesty, specifically taxpayers of Malang
Yayuk Ngesti Rahayu
doaj +1 more source

