Results 111 to 120 of about 13,301 (286)

Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level

open access: yes, 2017
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core  

The Tree of Life Synagogue Attack: A Terrorist Radicalization Assessment Protocol‐18 Examination of Pre‐Attack Warnings and Post‐Attack Contagion and Copycat Effects

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT This is a retrospective case study of an antisemitic lone actor terrorist who completed the deadliest attack against the Jewish community in American history. The analysis through the lens of the Terrorist Radicalization Assessment Protocol (TRAP‐18) finds that 72% of the warning indicators were present, including four proximal warning ...
Molly Amman, Julia Kupper, J. Reid Meloy
wiley   +1 more source

Unveiling XSS Threats: A Bipartite Graph Approach with Ensemble Deep Learning for Enhanced Detection

open access: yesInformation
Cross-Site Scripting (XSS) attacks are a common source of vulnerability for web applications, necessitating scalable mechanisms for detection. In this work, a new method based on bipartite graph-based feature extraction and an ensemble learning ...
Wafa Alorainy
doaj   +1 more source

The Influence of Drosophila Spire and Myosin V During Mid‐Oogenesis Is Independent of Their Direct Interaction

open access: yesCytoskeleton, EarlyView.
ABSTRACT Cooperativity between cytoskeletal proteins is crucial for spatiotemporal coordination in biological processes, like oogenesis. In mammalian and Drosophila oogenesis, proper assembly and function of actin networks require coordination between actin assembly factors Spire and formins, as well as actin‐associated proteins like myosins and Rab ...
Joseph Y. Ong   +7 more
wiley   +1 more source

Analysis of Network Intrusion Detection Based on Semi-Supervised and SS-DGM

open access: yesIEEE Access
The rapid advancement of technology has made network security a hot topic of concern for researchers worldwide. Therefore, to improve the accuracy and real-time response capability of network intrusion detection systems, and to effectively detect and ...
Xiao Yu   +5 more
doaj   +1 more source

Xylose Acetals ‐ a New Class of Sustainable Solvents and Their Application in Enzymatic Polycondensation

open access: yesChemSusChem, Volume 18, Issue 6, March 15, 2025.
Novel organic solvents with an unmodified carbohydrate core were synthesised both from D‐xylose and directly from biomass and were successfully used as reaction media for lipase biocatalysts to synthesise aliphatic and aromatic polyesters. Abstract The use of organic solvents in academic research and industry applications is facing increasing ...
Anastasia O. Komarova   +8 more
wiley   +1 more source

Controlling user access with scripting to mitigate cyber-attacks

open access: yesScientific African
With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems.
Owusu Nyarko-Boateng   +3 more
doaj   +1 more source

Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions [PDF]

open access: yes
Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones ...
Alexandru TABUSCA, Ion LUNGU
core  

Spatial distribution of acoustic traits in bird assemblages along regional bioclimatic gradients

open access: yesEcography, EarlyView.
Environmental variation shapes acoustic interactions among birds, creating spatial structures in the sonic signature of local species assemblages. Exploring these patterns at regional scales can reveal processes that segregate acoustic strategies along environmental gradients.
Michela Busana   +11 more
wiley   +1 more source

Thalamic connectivity mirrors spatial maps of network dysfunction in nonlesional focal epilepsy

open access: yesEpilepsia, EarlyView.
Abstract Objective Focal epilepsy is increasingly conceptualized as a network disorder, yet the extent to which network dysfunction reflects a shared phenotype remains unknown. Spatially conserved patterns of network dysfunction may implicate a centralized mechanism underlying widespread impairment.
Joline M. Fan   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy