Results 101 to 110 of about 1,413,174 (285)

Modeling and performance evaluation of computer systems security operation

open access: yes, 2012
A model of computer system security operation is developed based on the fork-join queueing network formalism. We introduce a security operation performance measure, and show how it may be used to performance evaluation of actual systems.Comment ...
Guster, D., Krivulin, N. K.
core  

Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]

open access: yes, 2007
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core  

Effects of Causal Beliefs About Gout on Public Views About Gout Management: A Randomized Experimental Study

open access: yesArthritis Care &Research, EarlyView.
Objective Despite well‐described biologic causes, the public views unhealthy lifestyle choices as the primary cause of gout. This study investigated how causal beliefs about gout influence the public's views about its management. Methods In a randomized study, 201 members of the public viewed one of two 2‐minute videos about gout.
Rachel Murdoch   +6 more
wiley   +1 more source

Associations of Rheumatoid Arthritis Disease Activity With Frailty Over Five Years of Follow‐up

open access: yesArthritis Care &Research, EarlyView.
Objective To evaluate whether rheumatoid arthritis (RA) disease activity is associated with frailty both in cross‐section and longitudinally. Methods Participants within the Veterans Affairs Rheumatoid Arthritis (VARA) registry enrolled from 2003 to 2022 were included.
Courtney N. Loecker   +14 more
wiley   +1 more source

Real‐world trends in prenatal antirheumatic drug utilization in Ontario, Canada: A cross‐sectional time‐series analysis

open access: yesArthritis Care &Research, Accepted Article.
Objectives This study aimed to describe real‐world trends in preconception and prenatal use of antirheumatic drugs among pregnant individuals with rheumatic diseases in Ontario, Canada. Methods We conducted a time‐series analysis using repeated cross‐sectional data to examine annual patterns of disease‐modifying antirheumatic drug (DMARD) use among ...
Shenthuraan Tharmarajah   +6 more
wiley   +1 more source

Towards Security Requirements in Online Summative Assessments

open access: yes, 2009
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core  

Thermodynamic Pathways of Nonequilibrium Solidification in Wire‐Arc Additive Manufacturing Fe‐Based Multicomponent Alloy Structures

open access: yesAdvanced Engineering Materials, EarlyView.
Geometry‐driven thermal behavior in wire‐arc additive manufacturing (WAAM) influences microstructural evolution during nonequilibrium solidification of a chemically complex Fe–Cr–Nb–W–Mo–C nanocomposite system. By comparing different deposits configurations, distinct entropy–cooling rate correlations, segregation, and carbide evolution are revealed ...
Blanca Palacios   +5 more
wiley   +1 more source

Selecting a Cybersecurity Risk Analysis Methodology for MSMEs Using a Multi-Criteria Method (AHP)

open access: yesTechnologies
In the current context of digital transformation, Micro-, Small-, and Medium-Sized Enterprises (MSMEs) are increasingly exposed to cybersecurity risks.
Gabriel Enrique Taborda Blandon   +5 more
doaj   +1 more source

Non-developmental item computer systems and the malicious software threat [PDF]

open access: yes
The following subject areas are covered: a DOD development system - the Army Secure Operating System; non-development commercial computer systems; security, integrity, and assurance of service (SI and A); post delivery SI and A and malicious software ...
Bown, Rodney L.
core   +1 more source

Influence of an Oxygen‐Free Atmosphere on Diamond‐Single‐Grain Scratching of Ti–6Al–4V

open access: yesAdvanced Engineering Materials, EarlyView.
Single‐grain scratching of Ti–6Al–4V is investigated under controlled, oxygen‐free, and ambient atmospheres using a novel experimental setup with in situ high‐speed imaging. The approach enables direct observation of chip formation and adhesion under suppressed oxidation.
Berend Denkena   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy