Results 51 to 60 of about 3,500,013 (329)

Security awareness and affective feedback:categorical behaviour vs. reported behaviour [PDF]

open access: yes, 2017
A lack of awareness surrounding secure online behaviour can lead to end-users, and their personal details becoming vulnerable to compromise. This paper describes an ongoing research project in the field of usable security, examining the relationship ...
Archibald, Jacqueline   +1 more
core   +4 more sources

Exploratory Analysis of ELP1 Expression in Whole Blood From Patients With Familial Dysautonomia

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Familial dysautonomia (FD) is a hereditary neurodevelopmental disorder caused by aberrant splicing of the ELP1 gene, leading to a tissue‐specific reduction in ELP1 protein expression. Preclinical models indicate that increasing ELP1 levels can mitigate disease manifestations.
Alejandra González‐Duarte   +13 more
wiley   +1 more source

A lightweight Xray-YOLO-Mamba model for prohibited item detection in X-ray images using selective state space models

open access: yesScientific Reports
X-ray image-based prohibited item detection plays a crucial role in modern public security systems. Despite significant advancements in deep learning, challenges such as feature extraction, object occlusion, and model complexity remain.
Kai Zhao   +3 more
doaj   +1 more source

Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung   +190 more
wiley   +1 more source

Comments on the Clique Number of Zero-Divisor Graphs of Zn

open access: yesJournal of Mathematics, 2022
In 2008, J. Skowronek-kazio´w extended the study of the clique number ωGZn to the zero-divisor graph of the ring Zn, but their result was imperfect. In this paper, we reconsider ωGZn of the ring Zn and give some counterexamples. We propose a constructive
Yanzhao Tian, Lixiang Li
doaj   +1 more source

Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz   +3 more
wiley   +1 more source

Low-rate Denial of Service attack detection method based on time-frequency characteristics

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
In this paper, a real cloud computing platform-oriented Low-rate Denial of Service (LDoS) attack detection method based on time-frequency characteristics of traffic data is proposed.
Yu Fu, Xueyuan Duan, Kun Wang, Bin Li
doaj   +1 more source

An Overview of Economic Approaches to Information Security Management [PDF]

open access: yes, 2006
The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security.
Su, X.
core   +2 more sources

Cognitive Status in People With Epilepsy in the Republic of Guinea: A Prospective, Case–Control Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick   +14 more
wiley   +1 more source

Interpreting the management of information systems security [PDF]

open access: yes, 1995
The management of adverse events within organisations has become a pressing issue as the perceptions of risk continue to heighten. However the basic need for developing secure information systems has remained unfulfilled.
Dhillon, Gurpreet
core  

Home - About - Disclaimer - Privacy