Results 61 to 70 of about 56,667 (320)
Guidelines for the development of strategy for securing the cyberspace [PDF]
The strategy for securing the cyberspace, created as a result of the challenges of a modern information society, is a proactive instrument intended to protect organizations and citizens against various forms of threats in the cyberspace.
Vuletić Dejan V.
doaj +1 more source
To integrate multiple transcriptomics data with severe batch effects for identifying MB subtypes, we developed a novel and accurate computational method named RaMBat, which leveraged subtype‐specific gene expression ranking information instead of absolute gene expression levels to address batch effects of diverse data sources.
Mengtao Sun, Jieqiong Wang, Shibiao Wan
wiley +1 more source
Microfluidic electro‐viscoelastic manipulation of extracellular vesicles
The electro‐viscoelastic manipulation as a potential method for separation of particles based on size. The particles introduced as a sheath flow migrate to the channel center under the influence of simultaneously applied electric field and pressure driven flow.
Seyedamirhosein Abdorahimzadeh +7 more
wiley +1 more source
The group fuzzy extractor allows group users to extract and reproduce group cryptographic keys from their individual non-uniform random sources. It can be easily used in group-oriented cryptographic applications.
Kaini Chen +4 more
doaj +1 more source
Cyberspace as a New Existential Dimension of Man
Since the second half of the twentieth century, especially from the 1990s to the present, we have seen significant sociocultural changes that have mostly been influenced by information technology.
S. Gálik, S. Tolnaiová
semanticscholar +1 more source
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman +4 more
wiley +1 more source
STATE SOVEREIGNTY AND SELF-DEFENCE IN CYBERSPACE
Given the increasing role and use of cyberspace in our daily lives, it is important to consider the large-scale dynamics of the cyber forum. Shifting the focus from individuals to nation states as participants that engage in activities in cyberspace ...
Pallavi Khanna
doaj +1 more source
Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats
While, until recently, cyber operations have constituted a specific subset of defense and security concerns, the synergization of cyberspace and artificial intelligence (AI), which are driving the Fourth Industrial Revolution, has raised the threat level
C. Gonçalves
semanticscholar +1 more source
This review provides an overview of bio‐based polymer sources, their unique functional properties and their environmental impact, and addresses their role as sustainable alternatives. It discusses end‐of‐life options, including composting and anaerobic digestion for renewable energy.
Sabina Kolbl Repinc +8 more
wiley +1 more source
Image Forgery Detection and Localization via a Reliability Fusion Map
Moving away from hand-crafted feature extraction, the use of data-driven convolution neural network (CNN)-based algorithms facilitates the realization of end-to-end automated forgery detection in multimedia forensics.
Hongwei Yao +4 more
doaj +1 more source

