Results 101 to 110 of about 212,585 (292)
CIDPro: Custom Instructions for Dynamic Program Diversification
Timing side-channel attacks pose a major threat to embedded systems due to their ease of accessibility. We propose CIDPro, a framework that relies on dynamic program diversification to mitigate timing side-channel leakage.
Biswas, Arnab Kumar +4 more
core +1 more source
ABSTRACT Introduction Following rapid iterations in media technologies, Chinese millennials (born between 1980 and 1995) find themselves in a paradoxical state where digital saturation exists alongside fatigue, making them central practitioners of digital minimalist behavior.
Chao Zhang, Yinze Hao, Jingwen Li
wiley +1 more source
ABSTRACT As emerging environmental contaminants, nano‐ and micro‐plastics (NMPs) have drawn increasing research attention due to potential hazards to organisms. Particle shape is a key factor influencing the toxic effects of NMPs, and NMPs of different shapes cause varying degrees of tissue damage. We investigated the specific mechanisms of polystyrene
Yuting Li +10 more
wiley +1 more source
An Approach for Actions to Prevent Suicides on Commuter and Metro Rail Systems in the United States, MTI Report 12-33 [PDF]
The primary goals of this report are to discuss measures to prevent suicides on commuter and metro rail systems, and to outline an approach for suicide prevention on rail systems.
Botha, Jan L. +2 more
core +1 more source
Anti-spoofing Methods for Automatic SpeakerVerification System
Growing interest in automatic speaker verification (ASV)systems has lead to significant quality improvement of spoofing attackson them. Many research works confirm that despite the low equal er-ror rate (EER) ASV systems are still vulnerable to spoofing ...
Lavrentyeva, Galina +2 more
core +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Introduction of neomycin-resistance into a marine-derived, wild-type Penicillium purpurogenum G59 resulted in activation of silent biosynthetic pathways for the secondary metabolite production.
Chang-Jing Wu +5 more
doaj +1 more source
Addressing Perceived Barriers to Achieving Competency in Clinical Endodontics: A Mixed‐Methods Study
ABSTRACT Purpose/Objectives The aim of this study was to assess predoctoral dental students’ satisfaction with faculty‐created educational content, aimed at reducing perceived barriers to achieving clinical competency in endodontics. Methods: This mixed‐methods study was conducted with third (D3)‐ and fourth (D4)‐year dental students at New York ...
Min‐Wen Fu +3 more
wiley +1 more source
This review synthesizes EEG findings from 28 VIMS studies across four inducing scenarios (abstract cues, virtual videos, vehicle driving, and game scenes) and two display types (HMD and monitor). While Delta/Theta enhancement consistently reflects sensory conflict, Alpha activity shows context dependency: predominantly increasing during passive viewing
Yanru Bai +5 more
wiley +1 more source
Abstract This is the first report of endoscopic ischemic polypectomy (EIP) for small intestinal polyps in a pediatric patient with juvenile polyposis syndrome (JPS). A 7‐year‐old girl underwent double‐balloon enteroscopy, during which 17 pedunculated polyps were treated using the crossed‐clip strangulation method without complications. Ten‐month follow‐
Shingo Kurasawa +5 more
wiley +1 more source

