Results 41 to 50 of about 3,289,244 (344)
Security-Informed Safety [PDF]
Society relies on the safe functioning of computer based networks and systems whether it is in transportation, in energy production, banking or in medical devices. In some sectors, notably high hazard ones, achieving and assuring safety is a relatively mature undertaking - although of course we must not be complacent [20,21]. The advent of cyber issues
Robin Bloomfield, Kate Netkachova
openaire +2 more sources
Information Flow Model for Commercial Security [PDF]
Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security.
Pan, Jene
core +1 more source
Information Security as Strategic (In)effectivity
Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have.
A Fielder+11 more
core +1 more source
Published incidents and their proportions of human error [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose - The information security field experiences a continuous stream of information security ...
Evans, M.+3 more
core +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts+8 more
wiley +1 more source
Health Information and Social Security Entitlements [PDF]
This study examines whether new health information, obtained through medical screening, affects entitlements to Social Security benefits. Random assignment of information is derived from a unique feature of the Continuous National Health and Nutrition ...
Perry Singleton
core +1 more source
Learning and Development Through the Scholarship of Teaching and Learning
ABSTRACT This article focuses on learning that can facilitate the transition from being a scholarly teacher to becoming a scholar of teaching and learning, outlining the critical steps faculty can take to deepen their engagement with the scholarship of teaching and learning (SoTL).
Jennifer Friberg, Melanie Hamilton
wiley +1 more source
MKTN: Adversarial-Based Multifarious Knowledge Transfer Network from Complementary Teachers
With the demands for light deep networks models in various front-end devices, network compression has attracted increasing interest for reducing model sizes yet without sacrificing much model accuracy.
Xiaobing Zhang+3 more
doaj +1 more source
Amyotrophic Lateral Sclerosis as a Multistep Process in the United States: A Population‐Based Study
ABSTRACT Background Amyotrophic lateral sclerosis (ALS) is a fatal, progressive neurodegenerative disease that typically results in death within 3–5 years from symptom onset. However, little is known about the environmental exposures, clinical aspects, or social determinants of health factors that may be associated with the disease.
Jasmine Berry+7 more
wiley +1 more source
Criminal Trajectory Reconstruction Method Based on a Mobile Reference System
Criminal trajectory reconstruction is a crucial area of study in the investigative and evidentiary processes of public security departments. This paper proposes a method for reconstructing criminal trajectories based on a mobile reference system ...
Zhengyan Ding+4 more
doaj +1 more source