Results 41 to 50 of about 993,359 (292)
Persistent issues in encryption software: A heuristic and cognitive walkthrough [PDF]
The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security.
El-Abed, Jad, Szewczyk, Patryk S
core +1 more source
Levels and causes of household food and nutrition insecurity in dryland Kenya [PDF]
Ensuring food and nutrition security in the drylands of sub-Saharan Africa is a critical challenge. Often, information on the level of insecurity is either scanty or unavailable.
Imungi, J.K. +2 more
core +1 more source
Supporting Survivor‐Centered Care Through Digital Health Integration
ABSTRACT Survivors of childhood cancer face barriers to receiving guideline‐based, long‐term follow‐up care. Two digital tools, Passport for Care (PFC) and Cancer SurvivorLink (SurvivorLink), address complementary gaps by enabling tailored survivorship care plan (SCP) generation, updating, storage, and sharing.
Jordan G. Marchak +15 more
wiley +1 more source
General theoretical foundations of the study of the concept of «information security»
The article considers general theoretical approaches to understanding the concept of «information security». The study of the holistic concept of «information security» requires the use of a comprehensive approach to understanding the meaning of ...
M. V. Honcharov, A. V. Honcharov
doaj +1 more source
ABSTRACT Background Neuromyelitis optica spectrum disorder (NMOSD) is a relapsing autoimmune disease of the central nervous system. High‐dose intravenous methylprednisolone (IVMP) is the standard first‐line therapy for acute attacks, although some patients remain refractory.
Wataru Horiguchi +5 more
wiley +1 more source
Information security economic systems in national security country [PDF]
In today's world, information security becomes vital for ensuring the interests of man, society and the state and the most important, part of the whole system of national security. Doctrine considers all the work in the field of information based on the
Krapyvnyi, Ivan Vasylovych +6 more
core
Cyber security education is as essential as “The Three R’s” [PDF]
Smartphones have diffused rapidly across South African society and constitute the most dominant information and communication technologies in everyday use.
Blignaut, Renette J. +3 more
core +3 more sources
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source
MODELING THE CYBERSECURITY OF THE SOCIO-ECONOMIC SYSTEM UNDER MARTIAL LAW
Industry 5.0 is already gradually beginning to manifest itself in various aspects of our lives. It is especially sensitive for ensuring socio-economic development.
Mykola Izha +4 more
doaj +1 more source

