Results 31 to 40 of about 1,916,317 (370)
Well‐being on supportive techniques in amyotrophic lateral sclerosis: from neurologists' perspective
Abstract Objective To investigate intercultural neurologists' perception of well‐being in patients with amyotrophic lateral sclerosis (ALS) using gastrostomy (PEG), non‐invasive, and/or invasive ventilation (NIV/IV) and to analyse the determinants and impact on the management of the above medical interventions (MIs).
Krzysztof Barć+7 more
wiley +1 more source
Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities [PDF]
Approximate computing is an advanced computational technique that trades the accuracy of computation results for better utilization of system resources. It has emerged as a new preferable paradigm over traditional computing architectures for many applications where inaccurate results are acceptable.
Weiqiang Liu+5 more
openaire +4 more sources
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-knowledge from these sources would provide security analysts with credible information, which they can use to detect or find patterns indicative of a cyber-attack.
Aritran Piplai+5 more
doaj +1 more source
Towards operational measures of computer security [PDF]
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S.+8 more
core +2 more sources
Delta system transfer function model for IEMI time domain test [PDF]
Intentional electromagnetic interference (IEMI) is a serious threat to the stable operation of computer and other intelligent terminal equipment. For testing research on IEMI, it is very important to build a stable and reliable test system model for ...
Ma Rupo+3 more
doaj +1 more source
SECURITY OF TEACHING ACTIVITIES ONLINE [PDF]
The current pandemic context has led to the rapid transition of all online teaching activities, and the security of all activities has become vulnerable, largely due to limited awareness by students and teachers, creating a security breach through the ...
CARINA-ELENA STEGĂROIU+2 more
doaj
The protection of information against electromagnetic penetration is one of the most important aspects related to the protection of information against its non-invasive acquisition. Compared to the activities of cybercriminals, the use of electromagnetic
Ireneusz Kubiak, Artur Przybysz
doaj +1 more source
Computer and Network Security [PDF]
175 pages, 87 figures and 44 ...
Sen, Jaydip+16 more
openaire +3 more sources
Constructing a Macro Virus to Upgrading Antivirus Programs [PDF]
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. a macro virus is a virus that is written in a macro language, a language built into a software application such as a Word processor,
Wesam S. Bhaya, Alaa Abd Alhesain
doaj +1 more source
Secure computation without computers
The design of secure protocols which can be used without the aid of a computer and without cryptographic knowledge is an interesting and challenging research task. Indeed, protocols enjoying these features could be useful in a variety of settings where computers cannot be used or where people feel uncomfortable to interact with or trust a computer.
D'ARCO, Paolo, DE PRISCO, Roberto
openaire +2 more sources