Results 81 to 90 of about 29,121 (270)

Stealthy Deception Attacks Against SCADA Systems

open access: yes, 2017
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values ...
A Kleinmann   +12 more
core   +1 more source

How Effective Are Ireland's Monitory Mechanisms in Improving Its Child Protection and Welfare Services?

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT Child protection and welfare systems are entrusted with significant power by governments and are therefore a significant focus of monitoring activities. Monitoring can help to build a better child protection system and to ensure child safety; track policy and legislative implementation and resource allocation; contribute to preventing systemic
Kenneth Burns   +3 more
wiley   +1 more source

Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks

open access: yesFuture Internet
The Internet of Things (IoT) has revolutionized connected devices, with applications in healthcare, data analytics, and smart cities. For time-sensitive applications, 5G wireless networks provide ultra-reliable low-latency communication (URLLC) and fog ...
Jiayi Zhang   +2 more
doaj   +1 more source

Mothering Through the Experiences of Homelessness With a Particular Focus on Child Separation in High‐Income Countries: A Scoping Review

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT Mothers who experience homelessness represent one of the most vulnerable and marginalized groups, often facing separation from their children as a consequence of housing instability and intersecting challenges. While there is a substantial body of research on parenting in the context of homelessness, little is known about the experience of ...
Olayinka Ariba   +5 more
wiley   +1 more source

A Reliable Path Selection and Packet Forwarding Routing Protocol for Vehicular Ad hoc Networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
Vehicular ad hoc networks (VANETs) have earned a gigantic consideration in the recent era. Wide deployment of VANETs for enhancing traffic safety, traffic management, and assisting drivers through elegant transportation system is facing several research ...
Irshad Ahmed Abbasi   +2 more
doaj   +1 more source

Packet Transactions: High-level Programming for Line-Rate Switches

open access: yes, 2016
Many algorithms for congestion control, scheduling, network measurement, active queue management, security, and load balancing require custom processing of packets as they traverse the data plane of a network switch. To run at line rate, these data-plane
Alizadeh, Mohammad   +8 more
core   +1 more source

Understanding the Link Between Social Support Networks, Self‐Efficacy and Future Orientation During Emerging Adulthood: A Comparison of At‐Risk and Non‐at‐Risk Emerging Adults

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT At‐risk emerging adults may be less inclined to invest in future goals, yet the mechanisms underlying their future orientation (FO) remain unclear. Therefore, this study examined how social support network attributes contribute to FO in at‐risk and non‐at‐risk emerging adults and the mediating role of self‐efficacy.
Eran P. Melkman, Yafit Sulimani‐Aidan
wiley   +1 more source

Making, Unmaking and Remaking Home: Foster Carers' Home Practices Within Australia's Child Protection System

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT This paper draws from interviews with 16 foster carers to explore their efforts to make and remake a sense of home for young people in out‐of‐home care. Our findings highlight home as an important idea and a challenge for carers. Home was a deliberate achievement, created through practices that responded to each young person as an individual ...
Sharyn Goudie   +3 more
wiley   +1 more source

Perlindungan terhadap Pengungsi/Pencari Suaka di Indonesia (sebagai Negara Transit) menurut Konvensi 1951 dan Protokol 1967

open access: yesKanun, 2015
ABSTRAK: Ada sekitar 13.000 pengungsi dan pencari suaka di Indonesia. Indonesia belum menjadi peserta Konvensi 1951 yang terkait dengan Keadaan Pengungsi (Konvensi Pengungsi) atau Protokol 1967.
Rosmawati Rosmawati
doaj   +1 more source

ACO–IBR: a modified intersection‐based routing approach for the VANET

open access: yesIET Networks, 2020
The usage of dedicated short‐range communication, vehicular ad hoc network (VANET) significantly increases the security of stakeholders and improves the efficacy of the intelligent transportation system.
Bhushan Yelure, Shefali Sonavane
doaj   +1 more source

Home - About - Disclaimer - Privacy