Modeling and performance evaluation of computer systems security operation
A model of computer system security operation is developed based on the fork-join queueing network formalism. We introduce a security operation performance measure, and show how it may be used to performance evaluation of actual systems.Comment ...
Guster, D., Krivulin, N. K.
core
Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core
Objective Despite well‐described biologic causes, the public views unhealthy lifestyle choices as the primary cause of gout. This study investigated how causal beliefs about gout influence the public's views about its management. Methods In a randomized study, 201 members of the public viewed one of two 2‐minute videos about gout.
Rachel Murdoch +6 more
wiley +1 more source
Associations of Rheumatoid Arthritis Disease Activity With Frailty Over Five Years of Follow‐up
Objective To evaluate whether rheumatoid arthritis (RA) disease activity is associated with frailty both in cross‐section and longitudinally. Methods Participants within the Veterans Affairs Rheumatoid Arthritis (VARA) registry enrolled from 2003 to 2022 were included.
Courtney N. Loecker +14 more
wiley +1 more source
Objectives This study aimed to describe real‐world trends in preconception and prenatal use of antirheumatic drugs among pregnant individuals with rheumatic diseases in Ontario, Canada. Methods We conducted a time‐series analysis using repeated cross‐sectional data to examine annual patterns of disease‐modifying antirheumatic drug (DMARD) use among ...
Shenthuraan Tharmarajah +6 more
wiley +1 more source
Towards Security Requirements in Online Summative Assessments
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core
Geometry‐driven thermal behavior in wire‐arc additive manufacturing (WAAM) influences microstructural evolution during nonequilibrium solidification of a chemically complex Fe–Cr–Nb–W–Mo–C nanocomposite system. By comparing different deposits configurations, distinct entropy–cooling rate correlations, segregation, and carbide evolution are revealed ...
Blanca Palacios +5 more
wiley +1 more source
Selecting a Cybersecurity Risk Analysis Methodology for MSMEs Using a Multi-Criteria Method (AHP)
In the current context of digital transformation, Micro-, Small-, and Medium-Sized Enterprises (MSMEs) are increasingly exposed to cybersecurity risks.
Gabriel Enrique Taborda Blandon +5 more
doaj +1 more source
Non-developmental item computer systems and the malicious software threat [PDF]
The following subject areas are covered: a DOD development system - the Army Secure Operating System; non-development commercial computer systems; security, integrity, and assurance of service (SI and A); post delivery SI and A and malicious software ...
Bown, Rodney L.
core +1 more source
Influence of an Oxygen‐Free Atmosphere on Diamond‐Single‐Grain Scratching of Ti–6Al–4V
Single‐grain scratching of Ti–6Al–4V is investigated under controlled, oxygen‐free, and ambient atmospheres using a novel experimental setup with in situ high‐speed imaging. The approach enables direct observation of chip formation and adhesion under suppressed oxidation.
Berend Denkena +2 more
wiley +1 more source

