Results 41 to 50 of about 3,289,244 (344)

Security-Informed Safety [PDF]

open access: yesComputer, 2016
Society relies on the safe functioning of computer based networks and systems whether it is in transportation, in energy production, banking or in medical devices. In some sectors, notably high hazard ones, achieving and assuring safety is a relatively mature undertaking - although of course we must not be complacent [20,21]. The advent of cyber issues
Robin Bloomfield, Kate Netkachova
openaire   +2 more sources

Information Flow Model for Commercial Security [PDF]

open access: yes, 2009
Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security.
Pan, Jene
core   +1 more source

Information Security as Strategic (In)effectivity

open access: yes, 2016
Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have.
A Fielder   +11 more
core   +1 more source

Published incidents and their proportions of human error [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose - The information security field experiences a continuous stream of information security ...
Evans, M.   +3 more
core   +1 more source

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Health Information and Social Security Entitlements [PDF]

open access: yes, 2013
This study examines whether new health information, obtained through medical screening, affects entitlements to Social Security benefits. Random assignment of information is derived from a unique feature of the Continuous National Health and Nutrition ...
Perry Singleton
core   +1 more source

Learning and Development Through the Scholarship of Teaching and Learning

open access: yesNew Directions for Adult and Continuing Education, EarlyView.
ABSTRACT This article focuses on learning that can facilitate the transition from being a scholarly teacher to becoming a scholar of teaching and learning, outlining the critical steps faculty can take to deepen their engagement with the scholarship of teaching and learning (SoTL).
Jennifer Friberg, Melanie Hamilton
wiley   +1 more source

MKTN: Adversarial-Based Multifarious Knowledge Transfer Network from Complementary Teachers

open access: yesInternational Journal of Computational Intelligence Systems
With the demands for light deep networks models in various front-end devices, network compression has attracted increasing interest for reducing model sizes yet without sacrificing much model accuracy.
Xiaobing Zhang   +3 more
doaj   +1 more source

Amyotrophic Lateral Sclerosis as a Multistep Process in the United States: A Population‐Based Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Amyotrophic lateral sclerosis (ALS) is a fatal, progressive neurodegenerative disease that typically results in death within 3–5 years from symptom onset. However, little is known about the environmental exposures, clinical aspects, or social determinants of health factors that may be associated with the disease.
Jasmine Berry   +7 more
wiley   +1 more source

Criminal Trajectory Reconstruction Method Based on a Mobile Reference System

open access: yesComputational Urban Science
Criminal trajectory reconstruction is a crucial area of study in the investigative and evidentiary processes of public security departments. This paper proposes a method for reconstructing criminal trajectories based on a mobile reference system ...
Zhengyan Ding   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy