Results 51 to 60 of about 2,411,901 (357)
Trust Implications of DDoS Protection in Online Elections
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris+3 more
core +1 more source
Unmanned Aerial Vehicles ‘in service’ of Internal Security of the State
The study was created thanks to the author’s preferences to learn increasingly more about new technologies that are able to increase the potential of internal security of the state. Recently, interest in recording areas (difficult to access, dangerous, monitored in adverse weather conditions, monitored due to the implementation of tasks by relevant ...
openaire +1 more source
Intelligence and Security Services in Tito's Yugoslavia [PDF]
As with the other communist-governed states, socialist Yugoslavia had a broadly developed state and military security apparatus. The article describes the initial steps of the Department for the People’s Protection (locally known as the OZNA).
Bojan Dimitrijević
doaj +1 more source
SHELBRS: Location Based Recommendation Services using Switchable Homomorphic Encryption [PDF]
Location-Based Recommendation Services (LBRS) has seen an unprecedented rise in its usage in recent years. LBRS facilitates a user by recommending services based on his location and past preferences. However, leveraging such services comes at a cost of compromising one's sensitive information like their shopping preferences, lodging places, food habits,
arxiv
Unraveling Mycobacterium tuberculosis acid resistance and pH homeostasis mechanisms
Mycobacterium tuberculosis exhibits a remarkable resilience to acid stress. In this Review, we discuss some of the molecular mechanisms and metabolic pathways used by the tubercle bacilli to adapt and resist host‐mediated acid stress. Mycobacterium tuberculosis (Mtb) is a successful pathogen that has developed a variety of strategies to survive and ...
Janïs Laudouze+3 more
wiley +1 more source
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can
Chen, Zhi+3 more
core +1 more source
SALR: Secure adaptive load-balancing routing in service oriented wireless sensor networks [PDF]
Congestion control and secure data transfer are the major factors that enhance the efficiency of Service Oriented Wireless Sensor Networks. It is desirable to modify the routing and security schemes adaptively in order to respond effectively to the ...
Dinesh Anvekar, .+7 more
core +1 more source
Comprehensive cancer centre (CCCs) and CCCs of Excellence (CCCoE) integration in healthcare. Through outreach to surrounding community hospitals, CCCs enable wider access to top‐clinical cancer treatments and care, thereby facilitating the swift enrolment of patients into data‐rich clinical trials (PI‐initiated trials testing new concepts, drug ...
Anton Berns+4 more
wiley +1 more source
RSMS: Towards Reliable and Secure Metaverse Service Provision [PDF]
Establishing and sustaining Metaverse service necessitates an unprecedented scale of resources. This paper considers the deployment of Metaverse service in a cloud-edge resource architecture, which can satisfy the escalating demand for Metaverse service resources while ensuring both high bandwidth and low latency.
arxiv
Crime Against History: Slavery, Race, and the 1776 Report
ABSTRACT With the 2025 executive order, “Ending Radical Indoctrination in K‐12 Schooling,” the Trump administration reestablished the 1776 Commission, which produced The 1776 Report. This article argues that this report, which is an unsubtle response to The 1619 Project, reveals how White Christian Nationalists wish to mandate that a hyper‐patriotic ...
William V. Trollinger
wiley +1 more source