Results 41 to 50 of about 14,354,866 (342)
Published incidents and their proportions of human error [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose - The information security field experiences a continuous stream of information security ...
Evans, M. +3 more
core +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
Low-rate Denial of Service attack detection method based on time-frequency characteristics
In this paper, a real cloud computing platform-oriented Low-rate Denial of Service (LDoS) attack detection method based on time-frequency characteristics of traffic data is proposed.
Yu Fu, Xueyuan Duan, Kun Wang, Bin Li
doaj +1 more source
Information Flow Model for Commercial Security [PDF]
Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security.
Pan, Jene
core +1 more source
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande +11 more
wiley +1 more source
MKTN: Adversarial-Based Multifarious Knowledge Transfer Network from Complementary Teachers
With the demands for light deep networks models in various front-end devices, network compression has attracted increasing interest for reducing model sizes yet without sacrificing much model accuracy.
Xiaobing Zhang +3 more
doaj +1 more source
AHP–TOPSIS integration extended with Pythagorean fuzzy sets for information security risk analysis
Risk analysis (RA) contains several methodologies that object to ensure the protection and safety of occupational stakeholders. Multi attribute decision-making (MADM) is one of the most important RA methodologies that is applied to several areas from ...
M. Fatih Ak, Muhammet Gul
semanticscholar +1 more source
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece +18 more
wiley +1 more source
Criminal Trajectory Reconstruction Method Based on a Mobile Reference System
Criminal trajectory reconstruction is a crucial area of study in the investigative and evidentiary processes of public security departments. This paper proposes a method for reconstructing criminal trajectories based on a mobile reference system ...
Zhengyan Ding +4 more
doaj +1 more source
Health Information and Social Security Entitlements [PDF]
This study examines whether new health information, obtained through medical screening, affects entitlements to Social Security benefits. Random assignment of information is derived from a unique feature of the Continuous National Health and Nutrition ...
Perry Singleton
core +1 more source

