Results 211 to 220 of about 67,029 (331)
Security Audit of IoT Device Networks: A Reproducible Machine Learning Framework for Threat Detection and Performance Benchmarking. [PDF]
Shaikhanova A +5 more
europepmc +1 more source
Side Information-Based Stealthy False Data Injection Attacks Against Multi-Sensor Remote Estimation [PDF]
Haibin Guo, Zhong‐Hua Pang, Chao Li
openalex +1 more source
ABSTRACT Protein S‐palmitoylation, a reversible lipid modification, plays critical roles in regulating protein function and localization. However, its comprehensive role in the rapid reprogramming of macrophages during early immune responses remains incompletely understood.
Hyojung Kim +4 more
wiley +1 more source
Optimized ensemble machine learning model for cyberattack classification in industrial IoT. [PDF]
Alabdullah B, Sankaranarayanan S.
europepmc +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Enhancing cybersecurity in virtual power plants by detecting network based cyber attacks using an unsupervised autoencoder approach. [PDF]
Singh KN +4 more
europepmc +1 more source
Medical Gas Plasma Inactivates Adenoviruses via Capsid Oxidation
Oxidative modification of three adenoviral capsid proteins after gas plasma treatment. Schematic representation of the viral infection process, starting with the initial attachment of the virus via its fiber protein binding to the cellular receptors (CAR and/or CD46). In the secondary attachment step, the penton base binds to integrin structures on the
Anke Schmidt +7 more
wiley +1 more source
Enhanced SQL injection detection using chi-square feature selection and machine learning classifiers. [PDF]
Casmiry E, Mduma N, Sinde R.
europepmc +1 more source
In this article, I analyze my interviews with Mark (pseudonym), a social scientist who committed major academic fraud in over 50 top‐tier journal articles in the first decade of this century. I explain how stigma played a central role in how Mark and I shaped our interaction. I focus on how Mark, a former Professor and Dean with a distinguished career,
Thaddeus Müller
wiley +1 more source

