Results 181 to 190 of about 31,297 (287)
A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection. [PDF]
Dutta V, Choraś M, Pawlicki M, Kozik R.
europepmc +1 more source
Nation-States and Their Operations in Planting of Malware in Other Countries: Is It Legal Under International Law [PDF]
Chung, John J.
core +1 more source
ABSTRACT Background The association between adverse childhood experiences (ACEs) and metabolic syndrome (MetS) across life course and its components (abdominal obesity, elevated blood pressure, dyslipidemia, and hyperglycemia) is poorly understood. Methods Three databases were screened for studies published January 2000–February 2024 that examined the ...
Joohan Kim +4 more
wiley +1 more source
The Intersection of Machine Learning and Wireless Sensor Network Security for Cyber-Attack Detection: A Detailed Analysis. [PDF]
Delwar TS +7 more
europepmc +1 more source
How hospitals can protect themselves from cyber attack. [PDF]
Owens B.
europepmc +1 more source
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
When all computers shut down: the clinical impact of a major cyber-attack on a general hospital. [PDF]
Abbou B +9 more
europepmc +1 more source
ABSTRACT Sugar crops, including but not limited to sugarcane, sugar beet, sweet sorghum and stevia, are major sources of sugar production in the world. However, conventional breeding approaches, limited by long breeding cycles, low efficiency and restricted capacity to improve complex traits in sugar crops, are increasingly insufficient to address the ...
Peilin Wang +7 more
wiley +1 more source
A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm. [PDF]
Jyothi KK +8 more
europepmc +1 more source
ABSTRACT Drought tolerance in crops often involves trade‐offs between water conservation, growth and reproduction. Understanding how water‐saving strategies are implemented at physiological and metabolic levels remains critical for improving crop performance under water‐limited conditions.
Ryosuke Mega +9 more
wiley +1 more source

