Cyber security data sources for dynamic network research
AD Kent - Dynamic Networks and Cyber-Security, 2016 - World Scientific
The importance of using real-world data to enable and validate dynamic network research
for the purposes of cyber security cannot be understated. Unfortunately, the use of real-world …
for the purposes of cyber security cannot be understated. Unfortunately, the use of real-world …
Transgender health content in medical education: a theory-guided systematic review of current training practices and implementation barriers & facilitators
J van Heesewijk, A Kent, TC van de Grift… - Advances in Health …, 2022 - Springer
Health disparities faced by transgender people are partly explained by barriers to trans-inclusive
healthcare, which in turn are linked to a lack of transgender health education in medical …
healthcare, which in turn are linked to a lack of transgender health education in medical …
Trust me, I'ma cartographer: Post-truth and the problem of acritical cartography
A Kent - The Cartographic Journal, 2017 - Taylor & Francis
Seventy years ago, Arthur H. Robinson submitted his PhD thesis at Ohio State University; a
document that laid the academic foundation for his seminal contribution to cartographic …
document that laid the academic foundation for his seminal contribution to cartographic …
[BOOK][B] The red atlas: How the Soviet Union secretly mapped the world
J Davies, AJ Kent - 2017 - degruyter.com
… Map collector John Davies collaborated with academic cartographer Alex Kent to tell the
story of how the USSR systematically mapped the West’s cities, ports, highways, railways, and …
story of how the USSR systematically mapped the West’s cities, ports, highways, railways, and …
Rate optimality and phase transition for user-level local differential privacy
A Kent, TB Berrett, Y Yu - arXiv preprint arXiv:2405.11923, 2024 - arxiv.org
Most of the literature on differential privacy considers the item-level case where each user has
a single observation, but a growing field of interest is that of user-level privacy where each …
a single observation, but a growing field of interest is that of user-level privacy where each …
Towards a bayesian network game framework for evaluating ddos attacks and defense
With a long history of compromising Internet security, Distributed Denial-of-Service (DDoS)
attacks have been intensively investigated and numerous countermeasures have been …
attacks have been intensively investigated and numerous countermeasures have been …
[PDF][PDF] Directing dinnertime: Practices and resources used by parents and children to deliver and respond to directive actions
A Kent - 2011 - core.ac.uk
This thesis is about the discursive practice of telling someone else to do something: an action
that has traditionally been called a directive. For example‘Finish your fish’,‘Sit straight’, and‘…
that has traditionally been called a directive. For example‘Finish your fish’,‘Sit straight’, and‘…
Burst spinal cord stimulation: review of preclinical studies and comments on clinical outcomes
K Chakravarthy, AR Kent, A Raza, F Xing… - … : Technology at the …, 2018 - Elsevier
Background Burst spinal cord stimulation (SCS) technology uses a novel waveform that
consists of closely packed high-frequency electrical impulses followed by a quiescent period. …
consists of closely packed high-frequency electrical impulses followed by a quiescent period. …
Values are not enough: qualitative study identifying critical elements for prioritization of health equity in health systems
Background Health system policies and programs that reduce health inequities and improve
health outcomes are essential to address unjust social gradients in health. Prioritization of …
health outcomes are essential to address unjust social gradients in health. Prioritization of …
A review of spinal and peripheral neuromodulation and neuroinflammation: lessons learned thus far and future prospects of biotype development
KV Chakravarthy, F Xing, K Bruno, AR Kent… - … : Technology at the …, 2019 - Elsevier
Background There is increasing literature evidence both clinically and experimentally on the
existence of potent, adaptive interactions between the central and peripheral aspects of the …
existence of potent, adaptive interactions between the central and peripheral aspects of the …