Results 61 to 70 of about 56,667 (320)

Guidelines for the development of strategy for securing the cyberspace [PDF]

open access: yesВојно дело, 2015
The strategy for securing the cyberspace, created as a result of the challenges of a modern information society, is a proactive instrument intended to protect organizations and citizens against various forms of threats in the cyberspace.
Vuletić Dejan V.
doaj   +1 more source

RaMBat: Accurate identification of medulloblastoma subtypes from diverse data sources with severe batch effects

open access: yesMolecular Oncology, EarlyView.
To integrate multiple transcriptomics data with severe batch effects for identifying MB subtypes, we developed a novel and accurate computational method named RaMBat, which leveraged subtype‐specific gene expression ranking information instead of absolute gene expression levels to address batch effects of diverse data sources.
Mengtao Sun, Jieqiong Wang, Shibiao Wan
wiley   +1 more source

Microfluidic electro‐viscoelastic manipulation of extracellular vesicles

open access: yesFEBS Open Bio, EarlyView.
The electro‐viscoelastic manipulation as a potential method for separation of particles based on size. The particles introduced as a sheath flow migrate to the channel center under the influence of simultaneously applied electric field and pressure driven flow.
Seyedamirhosein Abdorahimzadeh   +7 more
wiley   +1 more source

Dynamic group fuzzy extractor

open access: yesCybersecurity
The group fuzzy extractor allows group users to extract and reproduce group cryptographic keys from their individual non-uniform random sources. It can be easily used in group-oriented cryptographic applications.
Kaini Chen   +4 more
doaj   +1 more source

Cyberspace as a New Existential Dimension of Man

open access: yesCyberspace, 2019
Since the second half of the twentieth century, especially from the 1990s to the present, we have seen significant sociocultural changes that have mostly been influenced by information technology.
S. Gálik, S. Tolnaiová
semanticscholar   +1 more source

Navigating new norms: a systematic review of factors for the development of effective digital tools in higher education

open access: yesFEBS Open Bio, EarlyView.
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman   +4 more
wiley   +1 more source

STATE SOVEREIGNTY AND SELF-DEFENCE IN CYBERSPACE

open access: yesBRICS Law Journal, 2018
Given the increasing role and use of cyberspace in our daily lives, it is important to consider the large-scale dynamics of the cyber forum. Shifting the focus from individuals to nation states as participants that engage in activities in cyberspace ...
Pallavi Khanna
doaj   +1 more source

Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats

open access: yesCyberspace, 2019
While, until recently, cyber operations have constituted a specific subset of defense and security concerns, the synergization of cyberspace and artificial intelligence (AI), which are driving the Fourth Industrial Revolution, has raised the threat level
C. Gonçalves
semanticscholar   +1 more source

Understanding bio‐based polymers: A study of origins, properties, biodegradation and their impact on health and the environment

open access: yesFEBS Open Bio, EarlyView.
This review provides an overview of bio‐based polymer sources, their unique functional properties and their environmental impact, and addresses their role as sustainable alternatives. It discusses end‐of‐life options, including composting and anaerobic digestion for renewable energy.
Sabina Kolbl Repinc   +8 more
wiley   +1 more source

Image Forgery Detection and Localization via a Reliability Fusion Map

open access: yesSensors, 2020
Moving away from hand-crafted feature extraction, the use of data-driven convolution neural network (CNN)-based algorithms facilitates the realization of end-to-end automated forgery detection in multimedia forensics.
Hongwei Yao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy