Results 31 to 40 of about 1,916,317 (370)

Well‐being on supportive techniques in amyotrophic lateral sclerosis: from neurologists' perspective

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1874-1883, December 2022., 2022
Abstract Objective To investigate intercultural neurologists' perception of well‐being in patients with amyotrophic lateral sclerosis (ALS) using gastrostomy (PEG), non‐invasive, and/or invasive ventilation (NIV/IV) and to analyse the determinants and impact on the management of the above medical interventions (MIs).
Krzysztof Barć   +7 more
wiley   +1 more source

Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities [PDF]

open access: yesProceedings of the IEEE, 2020
Approximate computing is an advanced computational technique that trades the accuracy of computation results for better utilization of system resources. It has emerged as a new preferable paradigm over traditional computing architectures for many applications where inaccurate results are acceptable.
Weiqiang Liu   +5 more
openaire   +4 more sources

Creating Cybersecurity Knowledge Graphs From Malware After Action Reports

open access: yesIEEE Access, 2020
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-knowledge from these sources would provide security analysts with credible information, which they can use to detect or find patterns indicative of a cyber-attack.
Aritran Piplai   +5 more
doaj   +1 more source

Towards operational measures of computer security [PDF]

open access: yes, 1993
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S.   +8 more
core   +2 more sources

Delta system transfer function model for IEMI time domain test [PDF]

open access: yesITM Web of Conferences, 2022
Intentional electromagnetic interference (IEMI) is a serious threat to the stable operation of computer and other intelligent terminal equipment. For testing research on IEMI, it is very important to build a stable and reliable test system model for ...
Ma Rupo   +3 more
doaj   +1 more source

SECURITY OF TEACHING ACTIVITIES ONLINE [PDF]

open access: yesAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie, 2021
The current pandemic context has led to the rapid transition of all online teaching activities, and the security of all activities has become vulnerable, largely due to limited awareness by students and teachers, creating a security breach through the ...
CARINA-ELENA STEGĂROIU   +2 more
doaj  

Measurements and Correctness Criteria for Determining the Line Length of the Data Image Obtained in the Process of Electromagnetic Infiltration

open access: yesApplied Sciences, 2022
The protection of information against electromagnetic penetration is one of the most important aspects related to the protection of information against its non-invasive acquisition. Compared to the activities of cybercriminals, the use of electromagnetic
Ireneusz Kubiak, Artur Przybysz
doaj   +1 more source

Computer and Network Security [PDF]

open access: yes, 2020
175 pages, 87 figures and 44 ...
Sen, Jaydip   +16 more
openaire   +3 more sources

Constructing a Macro Virus to Upgrading Antivirus Programs [PDF]

open access: yesEngineering and Technology Journal, 2011
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. a macro virus is a virus that is written in a macro language, a language built into a software application such as a Word processor,
Wesam S. Bhaya, Alaa Abd Alhesain
doaj   +1 more source

Secure computation without computers

open access: yesTheoretical Computer Science, 2016
The design of secure protocols which can be used without the aid of a computer and without cryptographic knowledge is an interesting and challenging research task. Indeed, protocols enjoying these features could be useful in a variety of settings where computers cannot be used or where people feel uncomfortable to interact with or trust a computer.
D'ARCO, Paolo, DE PRISCO, Roberto
openaire   +2 more sources

Home - About - Disclaimer - Privacy