Results 31 to 40 of about 365,185 (272)

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Disruption of SETD3‐mediated histidine‐73 methylation by the BWCFF‐associated β‐actin G74S mutation

open access: yesFEBS Letters, EarlyView.
The β‐actin G74S mutation causes altered interaction of actin with SETD3, reducing histidine‐73 methylation efficiency and forming two distinct actin variants. The variable ratio of these variants across cell types and developmental stages contributes to tissue‐specific phenotypical changes. This imbalance may impair actin dynamics and mechanosensitive
Anja Marquardt   +8 more
wiley   +1 more source

Computer Attacks and Their Impact on the Security of Servers with Linux Operating System of Local Government Entities

open access: yesESPOCH Congresses
This research aims to determine the incidence of computer attacks on servers with the Linux operating system of local government entities. The study is limited to the decentralized autonomous government (GAD) of the Ecuadorian Amazon. Initially, the most
Francisco Javier Aguilar Feijóo   +1 more
doaj   +1 more source

Securing library information system: Vulnerabilities and threats [PDF]

open access: yes, 2010
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin   +3 more
core  

Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]

open access: yes, 2017
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco   +6 more
core   +1 more source

Translating a Preclinically Tested 15 Hz rTMS Protocol to Humans With Chronic Spinal Cord Injury: A Safety and Feasibility Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives Repetitive transcranial magnetic stimulation (rTMS) is a non‐invasive brain stimulation strategy with a demonstrated potential to reinforce the residual pathways after a spinal cord injury (SCI). A preclinically tested high‐frequency (15 Hz) rTMS (15 Hz rTMS) protocol was shown to induce corticospinal tract axon regeneration growth ...
Nabila Brihmat   +8 more
wiley   +1 more source

Risks and remedies in e-learning system

open access: yes, 2012
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher ...
Barik, Nikhilesh, Karforma, Sunil
core   +1 more source

Do GANs Leave Artificial Fingerprints? [PDF]

open access: yesConference on Multimedia Information Processing and Retrieval, 2018
In the last few years, generative adversarial networks (GAN) have shown tremendous potential for a number of applications in computer vision and related fields.
Francesco Marra   +3 more
semanticscholar   +1 more source

Lived and care experiences of chronic musculoskeletal shoulder pain in Australian adults: A qualitative study

open access: yesArthritis Care &Research, Accepted Article.
Objectives Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centred care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

Modelling Atherosclerotic Plaque Cap Mechanics: Microcalcifications Reduce Mechanical Properties in Mesenchymal Stromal Cell‐Based Model

open access: yesAdvanced Biology, EarlyView.
This study develops a tissue‐engineered model of the atherosclerotic cap using human mesenchymal stromal cells (MSCs). After 2 weeks of culture to produce a collagenous matrix, a mineralizing medium induces microcalcifications over 4 weeks. These constructs, imaged with second harmonic generation microscopy, lead to reduced ultimate stress at rupture ...
Imke L. Jansen   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy