Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ₁ Regularization. [PDF]
Hernandez-Suarez A +6 more
europepmc +1 more source
System level network data and models attack cancer drug resistance
Drug resistance is responsible for >90% of cancer related deaths. Cancer drug resistance is a system level network phenomenon covering the entire cell. Small‐scale interactomes and signalling network models of drug resistance guide directed drug development.
Márk Kerestély +6 more
wiley +1 more source
Cryogenian Glacial Erosion and Tectonics as Agents of Crustal Recycling
ABSTRACT Zircon preserves evidence of recycling processes that link surface environments to the mantle. Combined δ18O‐εHf in zircon fingerprints magmatic sources and tracks how crustal material is reworked over time. We apply statistical analyses to a global compilation that apparently resolves shifts in zircon U–Pb, δ18O, and Lu‐Hf data spanning the ...
M. Seraine +9 more
wiley +1 more source
Toward Determination of the Critical Breakdown Field in Rutile Sn1‐x Ge x O2 Alloys
Mansur and collaborators report on experiments designed to determine the critical field for electrostatic breakdown in ultra‐wide‐bandgap rutile Sn1‐xGexO2 alloys. Lateral metal–semiconductor–metal structures fabricated on undoped thin‐film alloys with x = 70% grown by pulsed‐laser deposition show breakdown voltages approach 900 V, corresponding to a ...
Uddrity Mansur +4 more
wiley +1 more source
Cyber Attacks in the Era of COVID-19 and Possible Solution Domains
Eian IC, Yong LK, Li MYX, Qi YH, Z F.
europepmc +1 more source
An Overview of Deep Learning Techniques for Big Data IoT Applications
Reviews deep learning integration with cloud, fog, and edge computing in IoT architectures. Examines model suitability across IoT applications, key challenges, and emerging trends Provides a comparative analysis to guide future deep learning research in IoT environments.
Gagandeep Kaur +2 more
wiley +1 more source
Empowering the nursing workforce for cyber-resilience: Strategic preparedness and care management during hospital cyberattacks. [PDF]
Dorosti AM +3 more
europepmc +1 more source
Mathematical modeling of adaptive information security strategies using composite behavior models. [PDF]
Nuaim AA, Nuaim AA, Nadeem M, Agrawal A.
europepmc +1 more source
Cyber attack and fault detection in DC microgrids by designing an event-triggered based-robust algorithm. [PDF]
Hosseini Rostami SM +2 more
europepmc +1 more source

