Results 11 to 20 of about 135,312 (231)

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Thorkelin y el Beowulf / Thorkelin and Beowulf [PDF]

open access: yes, 2017
An edition and translation of an unpublished essay by Jorge Luis Borges on the modern rediscovery of the Beowulf manuscript.
Joseph Stadolnik
core   +1 more source

The Lonely Girl. External Factors in the Conversion and Failed Ransom of the Turkish–Algerian Fatima (1608–1622)

open access: yesReligions, 2023
Research into various aspects of slavery and the related conversions has multiplied in recent years. This contribution investigates the case of Fatima, a young woman belonging to the Turkish–Algerian elite, who was captured in 1608 by the Tuscan Knights ...
Bruno Pomara Saverino
doaj   +1 more source

Femmes dans la guerre (XIVe-XVe siècles) : un rôle caché par les sources ?

open access: yesTabularia, 2004
Numerous stories, revealing women who counted as the first victims of war, may hide some isolated cases of women who actively took part in the war by, e.g.
Adrien Dubois
doaj   +1 more source

To pay or not: game theoretic models of ransomware [PDF]

open access: yes, 2019
Ransomware is a type of malware that encrypts files and demands a ransom from victims. It can be viewed as a form of kidnapping in which the criminal takes control of the victim’s files with the objective of financial gain. In this article, we review and
August   +38 more
core   +1 more source

Ransomware and reputation [PDF]

open access: yes, 2019
open access articleRansomware is a particular form of cyber-attack in which a victim loses access to either his electronic device or files unless he pays a ransom to criminals.
Anna Cartwright   +8 more
core   +2 more sources

“Robin Hook”: The developmental effects of Somali piracy [PDF]

open access: yes, 2011
Copyright @ 2011 Brunel UniversityNaval counter-piracy measures off Somalia have failed to change the incentives for pirates, raising calls for land-based approaches that may involve replacing piracy as a source of income.
Shortland, A
core   +2 more sources

Vente et rançonnement du butin humain des armées romaines à l’époque des conquêtes (264 av. J.-C. – 117 ap. J.-C.)

open access: yesLes Cahiers de Framespa, 2014
At the height of Roman imperialism, military victories brought in several millions of captives. Available figures show an increasing number of prisoners during the second half of the third century B.C. and until the first century B.C.
Jean-Christophe Robert
doaj   +1 more source

Finding (or not) New Gamma-ray Pulsars with GLAST [PDF]

open access: yes, 2007
Young energetic pulsars will likely be the largest class of Galactic sources observed by GLAST, with many hundreds detected. Many will be unknown as radio pulsars, making pulsation detection dependent on radio and/or x-ray observations or on blind ...
Ransom, Scott M.
core   +2 more sources

TAX AMNESTY: WHY IS IT BEHAVIOR COMPLIANCE?

open access: yesJurnal Aplikasi Manajemen, 2019
The main purpose of this paper is to discuss and describe the factors causing taxpayers not to comply with tax obligations in accordance with Law of the Republic of Indonesia Number 11 the Year 2016 regarding tax Amnesty, specifically taxpayers of Malang
Yayuk Ngesti Rahayu
doaj   +1 more source

Home - About - Disclaimer - Privacy