Results 51 to 60 of about 26,049,904 (376)
Detecting periodic subsequences in cyber security data
Statistical approaches to cyber-security involve building realistic probability models of computer network data. In a data pre-processing phase, separating automated events from those caused by human activity should improve statistical model building and
Heard, Nick +2 more
core +1 more source
EFEKTIVITAS KERJASAMA UNITED KINGDOM DAN INDONESIA DALAM MENINGKATKAN DIGITAL SECURITY DI INDONESIA MELALUI UK-INDONESIA TECH HUB [PDF]
The digital ecosystem in Indonesia has been growing in recent years. The Covid-19 pandemic was the point where the number of online application users rose rapidly to 442%.
Feryzal, Mochammad
core
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
The real-time infection hospitalisation and fatality risk across the COVID-19 pandemic in England
The COVID-19 pandemic led to 231,841 deaths and 940,243 hospitalisations in England, by the end of March 2023. This paper calculates the real-time infection hospitalisation risk (IHR) and infection fatality risk (IFR) using the Office for National ...
Thomas Ward +5 more
doaj +1 more source
Surface defect detection plays a crucial role in ensuring the quality standards of hot-rolled steel strips. To meet the demands for high precision and real-time performance in industrial defect detection, this paper introduces an improved one-stage ...
Yunfei Ma +4 more
doaj +1 more source
Strengthening Data Security: an Holistic Approach [PDF]
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection [PDF]
Most of the MANET security research has so far focused on providing routing security and confidentiality to the data packets, but less has been done to ensure privacy and anonymity of the communicating entities.
Hota, C. +3 more
core +1 more source
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande +11 more
wiley +1 more source
Improving Both Quantity and Quality: Incentive Mechanism for Social Mobile Crowdsensing Architecture
Mobile crowdsensing has emerged as an efficient paradigm for performing large-scale sensing tasks. Improving both the quantity and quality of users is still the pivotal problem for mobile crowdsensing system.
Jia Xu +4 more
doaj +1 more source
Some Potential Issues with the Security of HTML5 IndexedDB [PDF]
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy +2 more
core +1 more source

