Results 51 to 60 of about 3,475,621 (326)
Influence Maximization with Priority in Online Social Networks
The Influence Maximization (IM) problem, which finds a set of k nodes (called seedset) in a social network to initiate the influence spread so that the number of influenced nodes after propagation process is maximized, is an important problem in ...
Canh V. Pham +4 more
doaj +1 more source
Interpreting the management of information systems security [PDF]
The management of adverse events within organisations has become a pressing issue as the perceptions of risk continue to heighten. However the basic need for developing secure information systems has remained unfulfilled.
Dhillon, Gurpreet
core
Thrombolytic proteins profiling: High‐throughput activity, selectivity, and resistance assays
We present optimized biochemical protocols for evaluating thrombolytic proteins, enabling rapid and robust screening of enzymatic activity, inhibition resistance, and fibrin affinity, stimulation, and selectivity. The outcome translates to key clinical indicators such as biological half‐life and bleeding risk. These assays streamline the development of
Martin Toul +3 more
wiley +1 more source
X-ray image-based prohibited item detection plays a crucial role in modern public security systems. Despite significant advancements in deep learning, challenges such as feature extraction, object occlusion, and model complexity remain.
Kai Zhao +3 more
doaj +1 more source
A comprehensive review of cyber-physical security risks in new power system
This review systematically examines the multifaceted cyber-physical security risks facing new power systems during the global energy transition, with a focus on three critical dimensions.
Huang Huihui +4 more
doaj +1 more source
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart +4 more
wiley +1 more source
Microservice architecture faces security issues due to the large scale of services, resulting in a large attack surface. Integrating the concept of “continuous authentication, never trust” from the zero-trust security model into the access control of ...
Zhangwen Li +4 more
doaj +1 more source
Low-rate Denial of Service attack detection method based on time-frequency characteristics
In this paper, a real cloud computing platform-oriented Low-rate Denial of Service (LDoS) attack detection method based on time-frequency characteristics of traffic data is proposed.
Yu Fu, Xueyuan Duan, Kun Wang, Bin Li
doaj +1 more source
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
On the Performance Analysis for CSIDH-Based Cryptosystems
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo +3 more
doaj +1 more source

