Results 91 to 100 of about 6,906 (225)

How error correction affects polymerase chain reaction deduplication: A survey based on unique molecular identifier datasets of short reads

open access: yesQuantitative Biology, Volume 13, Issue 3, September 2025.
Abstract Next‐generation sequencing data are widely utilised for various downstream applications in bioinformatics and numerous techniques have been developed for PCR‐deduplication and error‐correction to eliminate bias and errors introduced during the sequencing.
Pengyao Ping   +4 more
wiley   +1 more source

Adaptive Online Learning Approaches for Detecting Unknown Attacks in Network Traffic: A Systematic Literature Review

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 5, September/October 2025.
ABSTRACT The increasing complexity and frequency of cyberattacks present significant challenges to Intrusion Detection Systems (IDS), mainly unknown (zero‐day) attacks. IDS are essential for safeguarding networks, but traditional systems struggle to detect unknown threats in dynamic and evolving network environments due to their reliance on predefined ...
Daniel Mourão Martins   +2 more
wiley   +1 more source

Analysis of cross-chain technology of blockchain

open access: yes物联网学报, 2020
With the development of blockchain technology,more and more blockchain projects have appeared.Due to the closure property of the blockchain,different blockchains have become islands of value.The information interaction and value transfer problems between
Zhao GUO   +4 more
doaj   +2 more sources

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

A Guide to Machine Learning Epistemic Ignorance, Hidden Paradoxes, and Other Tensions

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
ABSTRACT Machine learning (ML) has rapidly scaled in capacity and complexity, yet blind spots persist beneath its high performance façade. In order to shed more light on this argument, this paper presents a curated catalogue of 175 unconventional concepts, each capturing a paradox, tension, or overlooked risk in modern ML practice.
M. Z. Naser
wiley   +1 more source

Privacy Protection System of EMR Based on Hash Chain [PDF]

open access: gold, 2017
Dang Ying   +6 more
openalex   +1 more source

Home - About - Disclaimer - Privacy