Results 21 to 30 of about 39,171 (196)
Roku: A payload Generator Framework for Advanced System Exploitations [PDF]
In the era of continuous tech advances, generative AI and a constant push towards quantum technologies, we are still dealing with the constant cat and mouse game between attackers and defenders in the cyber space.
Alexandru-Cristian BARDAS
doaj +1 more source
Incentivizing P/CVE Research, Evaluation, & Program Participants
Incentivizing research or evaluation participants can be crucial toward reducing data collection timeframes and obtaining sufficient sample sizes (i.e., to reduce the risks of obtaining null or misleading findings).
Michael J. Williams
doaj
Research Methods Brief: Anatomy of Process Evaluations for P/CVE
Process Evaluations are evaluations focused on understanding how a program is implemented. This also can include evaluating the extent to which a program is implemented according to plan (i.e., evaluating its “program fidelity”).
Michael J. Williams
doaj
Cardiac Myxoma and Cerebrovascular Events: A Retrospective Cohort Study
Background: Cardiac myxoma (CM) is the most frequent, cardiac benign tumor and is associated with enhanced risk for cerebrovascular events (CVE). Although surgical CM excision is the only curative treatment to prevent CVE recurrence, in recent reports ...
Maria-Ioanna Stefanou +11 more
doaj +1 more source
Estimating ToE Risk Level using CVSS [PDF]
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal +1 more
core +3 more sources
The Common Vulnerabilities and Exposures (CVEs) system is a reference method for documenting publicly known information security weaknesses and exposures. This paper presents a study of the lifetime of CVEs in software projects and the risk factors affecting their existence.
Przymus, Piotr +3 more
openaire +2 more sources
For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such information.
Kenta Kanakogi +8 more
doaj +1 more source
Real-world outcomes of sipuleucel-T treatment in PROCEED, a prospective registry of men with metastatic castration-resistant prostate cancer. [PDF]
BackgroundThe large registry, PROVENGE Registry for the Observation, Collection, and Evaluation of Experience Data (PROCEED)(NCT01306890), evaluated sipuleucel-T immunotherapy for asymptomatic/minimally symptomatic metastatic castration-resistant ...
Armstrong, Andrew J +20 more
core +2 more sources
CVE: an R package for interactive variant prioritisation in precision oncology
Background An increasing number of precision oncology programmes are being launched world-wide. To support this development, we present the Cancer Variant Explorer (CVE), an R package with an interactive Shiny web browser interface.
Andreas Mock +5 more
doaj +1 more source
The critical velocity effect as a cause for the H\alpha emission from the Magellanic stream
Observations show significant H\alpha-emissions in the Galactic halo near the edges of cold gas clouds of the Magellanic Stream. The source for the ionization of the cold gas is still a widely open question.
Beuermann K. +18 more
core +1 more source

