Results 61 to 70 of about 199,972 (293)
A Robust Framework for Comprehensive Container Image Vulnerability Assessment
Container technologies have become integral to modern cloud-native application development, offering flexibility, scalability, and ease of deployment. Although containers offer efficiency and scalability in deploying and managing applications, they face ...
Youngsoo Kim, Cheolhee Park, Dowon Hong
doaj +1 more source
Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung +190 more
wiley +1 more source
Predicting Affected Docker Images From Emerging Vulnerabilities With a Tripartite Graph
Containerization is widely adopted across modern software systems, but it also increases exposure to a growing number of security vulnerabilities.
Sungjae Park +4 more
doaj +1 more source
nsroot: Minimalist Process Isolation Tool Implemented With Linux Namespaces [PDF]
Data analyses in the life sciences are moving from tools run on a personal computer to services run on large computing platforms. This creates a need to package tools and dependencies for easy installation, configuration and deployment on distributed ...
Bongo, Lars Ailo +2 more
core +2 more sources
Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz +3 more
wiley +1 more source
eBPF-Based Runtime Detection of Semantic DDoS Attacks in Linux Containers
Modern Distributed Denial-of-Service (DDoS)attacks increasingly target the application layer to exhaust CPU resources and disrupt service availability, particularly in containerized environments where isolation and diverse implementations complicate ...
S. Remya +7 more
doaj +1 more source
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source
On the inability of existing security models to cope with data mobility in dynamic organizations [PDF]
Modeling tools play an important role in identifying threats in traditional\ud IT systems, where the physical infrastructure and roles are assumed\ud to be static.
Dimkov, Trajce +2 more
core +5 more sources
Toward Smart Moving Target Defense for Linux Container Resiliency
This paper presents ESCAPE, an informed moving target defense mechanism for cloud containers. ESCAPE models the interaction between attackers and their target containers as a "predator searching for a prey" search game. Live migration of Linux-containers
Abed, Amr S. +3 more
core +1 more source
Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein +13 more
wiley +1 more source

