Results 81 to 90 of about 29,121 (270)
Stealthy Deception Attacks Against SCADA Systems
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values ...
A Kleinmann +12 more
core +1 more source
ABSTRACT Child protection and welfare systems are entrusted with significant power by governments and are therefore a significant focus of monitoring activities. Monitoring can help to build a better child protection system and to ensure child safety; track policy and legislative implementation and resource allocation; contribute to preventing systemic
Kenneth Burns +3 more
wiley +1 more source
Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks
The Internet of Things (IoT) has revolutionized connected devices, with applications in healthcare, data analytics, and smart cities. For time-sensitive applications, 5G wireless networks provide ultra-reliable low-latency communication (URLLC) and fog ...
Jiayi Zhang +2 more
doaj +1 more source
ABSTRACT Mothers who experience homelessness represent one of the most vulnerable and marginalized groups, often facing separation from their children as a consequence of housing instability and intersecting challenges. While there is a substantial body of research on parenting in the context of homelessness, little is known about the experience of ...
Olayinka Ariba +5 more
wiley +1 more source
A Reliable Path Selection and Packet Forwarding Routing Protocol for Vehicular Ad hoc Networks
Vehicular ad hoc networks (VANETs) have earned a gigantic consideration in the recent era. Wide deployment of VANETs for enhancing traffic safety, traffic management, and assisting drivers through elegant transportation system is facing several research ...
Irshad Ahmed Abbasi +2 more
doaj +1 more source
Packet Transactions: High-level Programming for Line-Rate Switches
Many algorithms for congestion control, scheduling, network measurement, active queue management, security, and load balancing require custom processing of packets as they traverse the data plane of a network switch. To run at line rate, these data-plane
Alizadeh, Mohammad +8 more
core +1 more source
ABSTRACT At‐risk emerging adults may be less inclined to invest in future goals, yet the mechanisms underlying their future orientation (FO) remain unclear. Therefore, this study examined how social support network attributes contribute to FO in at‐risk and non‐at‐risk emerging adults and the mediating role of self‐efficacy.
Eran P. Melkman, Yafit Sulimani‐Aidan
wiley +1 more source
ABSTRACT This paper draws from interviews with 16 foster carers to explore their efforts to make and remake a sense of home for young people in out‐of‐home care. Our findings highlight home as an important idea and a challenge for carers. Home was a deliberate achievement, created through practices that responded to each young person as an individual ...
Sharyn Goudie +3 more
wiley +1 more source
ABSTRAK: Ada sekitar 13.000 pengungsi dan pencari suaka di Indonesia. Indonesia belum menjadi peserta Konvensi 1951 yang terkait dengan Keadaan Pengungsi (Konvensi Pengungsi) atau Protokol 1967.
Rosmawati Rosmawati
doaj +1 more source
ACO–IBR: a modified intersection‐based routing approach for the VANET
The usage of dedicated short‐range communication, vehicular ad hoc network (VANET) significantly increases the security of stakeholders and improves the efficacy of the intelligent transportation system.
Bhushan Yelure, Shefali Sonavane
doaj +1 more source

