Results 31 to 40 of about 1,102 (116)
TargetGen‐recurrent neural network (RNN), an advanced generative model, generated 28,708 unique and novel compounds, identifying SAK‐2970 as a potent antibiotic against drug‐resistant Staphylococcus aureus. Exhibiting strong biofilm inhibition, high therapeutic efficacy, and minimal systemic toxicity in vivo, SAK‐2970 highlights its safety and clinical
Shakeel Ahmad Khan +2 more
wiley +1 more source
Event Log Correlation for Multi‐Step Attack Detection
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat +2 more
wiley +1 more source
BayesImposter: Bayesian Estimation Based .bss Imposter Attack on Industrial Control Systems
Over the last six years, several papers used memory deduplication to trigger various security issues, such as leaking heap-address and causing bit-flip in the physical memory.
Barua, Anomadarshi +2 more
core
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk +2 more
wiley +1 more source
Abstract The Covid‐19 pandemic and its sequalae mark the genesis of persistently high absenteeism in primary and secondary schools across the UK. Emotionally based school avoidance (EBSA) is documented as contributing to increased absenteeism. Early intervention is required to prevent this pattern of activity from becoming entrenched.
Caitlin McDonald, Aneeza Pervez
wiley +1 more source
High‐Throughput Strategies for Streamlining Lipid Nanoparticle Development Pipeline
This review highlights emerging state‐of‐the‐art high‐throughput strategies for optimising lipid nanoparticle formulation. By integrating combinatorial design, characterization, in vitro/in vivo screening, automation, and machine learning into a closed‐loop framework, it provides a roadmap to streamline discovery and accelerate the translation of ...
Lois Lam +3 more
wiley +1 more source
Finish Them!: Pricing Algorithms for Human Computation [PDF]
Given a batch of human computation tasks, a commonly ignored aspect is how the price (i.e., the reward paid to human workers) of these tasks must be set or varied in order to meet latency or cost constraints.
Gao, Yihan, Parameswaran, Aditya
core
StorjLedger leverages erasure‐coded sharding and Proof‐of‐Storage to deliver nearly 1000 transactions per second with sub‐second latency, 98% data redundancy, and 76% lower storage costs, resolving the blockchain trilemma by harmonizing scalability, security, and decentralization.
Saha Reno, Koushik Roy
wiley +1 more source
False Discovery Estimation in Record Linkage
ABSTRACT Integrating data from multiple sources expands research opportunities at low cost. However, due to different data collection processes and privacy constraints, unique identifiers are unavailable. Record linkage (RL) algorithms address this by probabilistically linking records based on partially identifying variables. Since these variables lack
Kayané Robach +2 more
wiley +1 more source

