Results 51 to 60 of about 3,352,449 (323)

Low-rate Denial of Service attack detection method based on time-frequency characteristics

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
In this paper, a real cloud computing platform-oriented Low-rate Denial of Service (LDoS) attack detection method based on time-frequency characteristics of traffic data is proposed.
Yu Fu, Xueyuan Duan, Kun Wang, Bin Li
doaj   +1 more source

Response to neoadjuvant chemotherapy in early breast cancers is associated with epithelial–mesenchymal transition and tumor‐infiltrating lymphocytes

open access: yesMolecular Oncology, EarlyView.
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane   +16 more
wiley   +1 more source

Security-Informed Safety [PDF]

open access: yesComputer, 2016
Society relies on the safe functioning of computer based networks and systems whether it is in transportation, in energy production, banking or in medical devices. In some sectors, notably high hazard ones, achieving and assuring safety is a relatively mature undertaking - although of course we must not be complacent [20,21]. The advent of cyber issues
Robin Bloomfield, Kate Netkachova
openaire   +2 more sources

SCDIS-210 Information Security Technology Coverage Measurement Standards [PDF]

open access: yes, 2015
These standards establish a simplified and consistent measurement for coverage of each of the security technologies listed therein. These standards are to be used for all South Carolina state agencies, including institutions, departments, divisions ...
Division of Information Security, Division of Technology State of South Carolina – Information Security Program
core  

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

On the Performance Analysis for CSIDH-Based Cryptosystems

open access: yesApplied Sciences, 2020
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo   +3 more
doaj   +1 more source

Vehicle Trajectory Prediction Method for Task Offloading in Vehicular Edge Computing

open access: yesSensors, 2023
Real-time computation tasks in vehicular edge computing (VEC) provide convenience for vehicle users. However, the efficiency of task offloading seriously affects the quality of service (QoS).
Ruibin Yan   +3 more
doaj   +1 more source

On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations [PDF]

open access: yesInternational Journal of Computer Network and Information Security(IJCNIS), 2019, 2019
A number of determinants predict the adoption of Information Systems (IS) security innovations. Amongst, perceived vulnerability of IS security threats has been examined in a number of past explorations. In this research, we examined the processes pursued in analysing the relationship between perceived vulnerability of IS security threats and the ...
arxiv   +1 more source

METTL3 knockout accelerates hepatocarcinogenesis via inhibiting endoplasmic reticulum stress response

open access: yesFEBS Open Bio, EarlyView.
Liver‐specific knockout of N6‐methyladenosine (m6A) methyltransferase METTL3 significantly accelerated hepatic tumor initiation under various oncogenic challenges, contrary to the previously reported oncogenic role of METTL3 in liver cancer cell lines or xenograft models. Mechanistically, METTL3 deficiency reduced m6A deposition on Manf transcripts and
Bo Cui   +15 more
wiley   +1 more source

Reve\{a,i\}ling the risks: a phenomenology of information security [PDF]

open access: yes, 2009
In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have.
Pieters, Wolter
core   +8 more sources

Home - About - Disclaimer - Privacy