Results 21 to 30 of about 39,171 (196)

Roku: A payload Generator Framework for Advanced System Exploitations [PDF]

open access: yesInformatică economică
In the era of continuous tech advances, generative AI and a constant push towards quantum technologies, we are still dealing with the constant cat and mouse game between attackers and defenders in the cyber space.
Alexandru-Cristian BARDAS
doaj   +1 more source

Incentivizing P/CVE Research, Evaluation, & Program Participants

open access: yesJournal for Deradicalization, 2022
Incentivizing research or evaluation participants can be crucial toward reducing data collection timeframes and obtaining sufficient sample sizes (i.e., to reduce the risks of obtaining null or misleading findings).
Michael J. Williams
doaj  

Research Methods Brief: Anatomy of Process Evaluations for P/CVE

open access: yesJournal for Deradicalization, 2022
Process Evaluations are evaluations focused on understanding how a program is implemented. This also can include evaluating the extent to which a program is implemented according to plan (i.e., evaluating its “program fidelity”).
Michael J. Williams
doaj  

Cardiac Myxoma and Cerebrovascular Events: A Retrospective Cohort Study

open access: yesFrontiers in Neurology, 2018
Background: Cardiac myxoma (CM) is the most frequent, cardiac benign tumor and is associated with enhanced risk for cerebrovascular events (CVE). Although surgical CM excision is the only curative treatment to prevent CVE recurrence, in recent reports ...
Maria-Ioanna Stefanou   +11 more
doaj   +1 more source

Estimating ToE Risk Level using CVSS [PDF]

open access: yes, 2009
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

The Secret Life of CVEs

open access: yes2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR), 2023
The Common Vulnerabilities and Exposures (CVEs) system is a reference method for documenting publicly known information security weaknesses and exposures. This paper presents a study of the lifetime of CVEs in software projects and the risk factors affecting their existence.
Przymus, Piotr   +3 more
openaire   +2 more sources

Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques

open access: yesInformation, 2021
For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such information.
Kenta Kanakogi   +8 more
doaj   +1 more source

Real-world outcomes of sipuleucel-T treatment in PROCEED, a prospective registry of men with metastatic castration-resistant prostate cancer. [PDF]

open access: yes, 2019
BackgroundThe large registry, PROVENGE Registry for the Observation, Collection, and Evaluation of Experience Data (PROCEED)(NCT01306890), evaluated sipuleucel-T immunotherapy for asymptomatic/minimally symptomatic metastatic castration-resistant ...
Armstrong, Andrew J   +20 more
core   +2 more sources

CVE: an R package for interactive variant prioritisation in precision oncology

open access: yesBMC Medical Genomics, 2017
Background An increasing number of precision oncology programmes are being launched world-wide. To support this development, we present the Cancer Variant Explorer (CVE), an R package with an interactive Shiny web browser interface.
Andreas Mock   +5 more
doaj   +1 more source

The critical velocity effect as a cause for the H\alpha emission from the Magellanic stream

open access: yes, 2000
Observations show significant H\alpha-emissions in the Galactic halo near the edges of cold gas clouds of the Magellanic Stream. The source for the ionization of the cold gas is still a widely open question.
Beuermann K.   +18 more
core   +1 more source

Home - About - Disclaimer - Privacy