Search

Results: 21
Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses
The detection of unauthorised users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or Virtual Private Networks (VPNs). This...
Published by: IGI Global
Detection of Anonymising Proxies Using Machine Learning
Network Proxies and Virtual Private Networks (VPN) are tools that are used every day to facilitate various business functions. However, they have gained popularity amongst unintended userbases as tools that can be used to hide...
Published by: IGI Global
Canadian Wraparound
For youth in the care of child welfare, the need for a greater emphasis on service integration and youth-centered approaches is widely agreed. This case study examined an implementation of the Wraparound approach, which focuses...
Research priorities relating to the delivery of cardiovascular prevention and rehabilitation programmes
OBJECTIVE: The purpose of this British Association for Cardiovascular Prevention and Rehabilitation (BACPR) research priority setting project (PSP) was to identify a top 10 list of priority research questions for cardiovascular...
Published by:
Potential Health Risks of Contaminants in Private Groundwater Sources in Newfoundland and Labrador
The Government of Newfoundland and Labrador regularly tests public drinking water supplies to ensure the absence of any microbiological, physical or chemical contaminants. Private water supplies, including wells however, fall...