User profiles for Alex Kent

Alex Kent

- Verified email at aplace.org - Cited by 1251

Alexandra Kent

- Verified email at keele.ac.uk - Cited by 1228

Alexander J. Kent

- Verified email at canterbury.ac.uk - Cited by 1004

Cyber security data sources for dynamic network research

AD Kent - Dynamic Networks and Cyber-Security, 2016 - World Scientific
The importance of using real-world data to enable and validate dynamic network research
for the purposes of cyber security cannot be understated. Unfortunately, the use of real-world …

Transgender health content in medical education: a theory-guided systematic review of current training practices and implementation barriers & facilitators

J van Heesewijk, A Kent, TC van de Grift… - Advances in Health …, 2022 - Springer
Health disparities faced by transgender people are partly explained by barriers to trans-inclusive
healthcare, which in turn are linked to a lack of transgender health education in medical …

Trust me, I'ma cartographer: Post-truth and the problem of acritical cartography

A Kent - The Cartographic Journal, 2017 - Taylor & Francis
Seventy years ago, Arthur H. Robinson submitted his PhD thesis at Ohio State University; a
document that laid the academic foundation for his seminal contribution to cartographic …

[BOOK][B] The red atlas: How the Soviet Union secretly mapped the world

J Davies, AJ Kent - 2017 - degruyter.com
… Map collector John Davies collaborated with academic cartographer Alex Kent to tell the
story of how the USSR systematically mapped the West’s cities, ports, highways, railways, and …

Rate optimality and phase transition for user-level local differential privacy

A Kent, TB Berrett, Y Yu - arXiv preprint arXiv:2405.11923, 2024 - arxiv.org
Most of the literature on differential privacy considers the item-level case where each user has
a single observation, but a growing field of interest is that of user-level privacy where each …

Towards a bayesian network game framework for evaluating ddos attacks and defense

G Yan, R Lee, A Kent, D Wolpert - … of the 2012 ACM conference on …, 2012 - dl.acm.org
With a long history of compromising Internet security, Distributed Denial-of-Service (DDoS)
attacks have been intensively investigated and numerous countermeasures have been …

[PDF][PDF] Directing dinnertime: Practices and resources used by parents and children to deliver and respond to directive actions

A Kent - 2011 - core.ac.uk
This thesis is about the discursive practice of telling someone else to do something: an action
that has traditionally been called a directive. For example‘Finish your fish’,‘Sit straight’, and‘…

Burst spinal cord stimulation: review of preclinical studies and comments on clinical outcomes

K Chakravarthy, AR Kent, A Raza, F Xing… - … : Technology at the …, 2018 - Elsevier
Background Burst spinal cord stimulation (SCS) technology uses a novel waveform that
consists of closely packed high-frequency electrical impulses followed by a quiescent period. …

Values are not enough: qualitative study identifying critical elements for prioritization of health equity in health systems

…, HW Strosher, S Shahram, P Dang, A Kent… - International Journal for …, 2020 - Springer
Background Health system policies and programs that reduce health inequities and improve
health outcomes are essential to address unjust social gradients in health. Prioritization of …

A review of spinal and peripheral neuromodulation and neuroinflammation: lessons learned thus far and future prospects of biotype development

KV Chakravarthy, F Xing, K Bruno, AR Kent… - … : Technology at the …, 2019 - Elsevier
Background There is increasing literature evidence both clinically and experimentally on the
existence of potent, adaptive interactions between the central and peripheral aspects of the …