Results 41 to 50 of about 178,776 (288)
Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine
Cyber physical systems (CPS), in the event of a cyber attack, can have a serious impact on the operating physical equipment. In order to improve the attack detection capability of CPS, an support vector machine (SVM) attacks detection model based on ...
Fengchun Liu +3 more
doaj +1 more source
Reducing the Time to Detect Cyber Attacks - Combining Attack Simulation With Detection Logic
Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are becoming more sophisticated and targeted, leaving unprepared environments easy prey for the attackers.
Myllyla, Juuso, Costin, Andrei
openaire +2 more sources
ABSTRACT Surveillance imaging aims to detect tumour relapse before symptoms develop, but it's unclear whether earlier detection of relapse leads to better outcomes in children and young people (CYP) with medulloblastoma and ependymoma. This systematic review aims to identify relevant literature to determine the efficacy of surveillance magnetic ...
Lucy Shepherd +3 more
wiley +1 more source
ABSTRACT Introduction Neuroblastoma (NB) with central nervous system (CNS) metastases is rare at diagnosis, but occurs more often during relapse/progression. Patients with CNS metastases face a dismal prognosis, with no standardized curative treatment available.
Vicente Santa‐Maria Lopez +13 more
wiley +1 more source
SynFacePAD 2023: Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data [PDF]
Meiling Fang +23 more
openalex +1 more source
Developmental Disorders in Children Recently Diagnosed With Cancer
ABSTRACT Neurocognitive deficits in adult survivors of childhood cancer are well established, but less is known about developmental disorders (DD) arising shortly after cancer diagnosis. Using 2016–2019 linked Ohio cancer registry and Medicaid data, we compared DD among 324 children with cancer and 606,913 cancer‐free controls.
Jamie Shoag +5 more
wiley +1 more source
DOS Attacks or Denial Of Services Attack have become very common amongst Hackers who use them as a path to get fame and respect in the underground groups of the Internet. Denial of Service Attacks basically means denying valid Internet and Network users from using the services of the target network or server.
null Prof. B. V. Jadhav +4 more
openaire +1 more source
ABSTRACT Background B‐cell lymphoblastic lymphoma (B‐LBL) represents a rare variety of non‐Hodgkin lymphoma, with limited research on its biology, progression, and management. Methods A retrospective analysis was performed on the clinical characteristics of 256 patients aged ≤18 years who received treatment under the China Net Childhood Lymphoma (CNCL)‐
Zhijuan Liu +20 more
wiley +1 more source
A Distributed Denial of Service (DDoS) attack is an attempt to make a service unavailable by overwhelming the server with malicious traffic. DDoS attacks have become the most tedious and cumbersome issue in recent past. The number and magnitude of attacks have increased from few megabytes of data to 100s of terabytes of data these days.
null Dhananjay Tangtode +4 more
openaire +1 more source
ABSTRACT Background The delipid extracorporeal lipoprotein filter from plasma (DELP) treatment can effectively reduce blood lipid, increase blood flow, and improve neurological deficits in patients with acute ischemic stroke (AIS). However, its effect on vision and retinal microcirculation in stroke patients has never been reported.
Ning Li +9 more
wiley +1 more source

