Results 61 to 70 of about 28,210 (305)
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman +4 more
wiley +1 more source
Multi-Level Steganography: Improving Hidden Communication in Networks
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the ...
Fraczek, Wojciech +2 more
core +2 more sources
A Construction Method of Covert Channel Based on File Storage Distribution [PDF]
A covert channel construction method based on covert information storage distribution is proposed to solve the problem that the existing reference length covert channels are different from legal channels in the channel entropy and length distribution ...
LU Siyan,LAN Shaohua
doaj +1 more source
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso +4 more
wiley +1 more source
Detecting Covert Channels Through Code Augmentation
Modern malware increasingly exploits information hiding or steganography to elude security frameworks and remain unnoticed for long periods. To this aim, a prime technique relies upon the ability of creating covert channels to bypass the limits imposed by a sandbox or to exfiltrate data towards a remote server. Unfortunately, detecting a covert channel
M Zuppelli, L Caviglione, M Repetto
openaire +2 more sources
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
The Technique to Prevent the Data Leakage using Covert Channels
The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and ...
Anna Vasilievna Arkhangelskaya +1 more
doaj
dUTPases are involved in balancing the appropriate nucleotide pools. We showed that dUTPase is essential for normal development in zebrafish. The different zebrafish genomes contain several single‐nucleotide variations (SNPs) of the dut gene. One of the dUTPase variants displayed drastically lower protein stability and catalytic efficiency as compared ...
Viktória Perey‐Simon +6 more
wiley +1 more source
Unique biological samples, such as site‐specific mutant proteins, are available only in limited quantities. Here, we present a polarization‐resolved transient infrared spectroscopy setup with referencing to improve signal‐to‐noise tailored towards tracing small signals. We provide an overview of characterizing the excitation conditions for polarization‐
Clark Zahn, Karsten Heyne
wiley +1 more source
Network Localization of Fatigue in Multiple Sclerosis
ABSTRACT Background Fatigue is among the most common symptoms and one of the main factors determining the quality of life in multiple sclerosis (MS). However, the neurobiological mechanisms underlying fatigue are not fully understood. Here we studied lesion locations and their connections in individuals with MS, aiming to identify brain networks ...
Olli Likitalo +12 more
wiley +1 more source

