Results 61 to 70 of about 3,488,252 (371)

Security-Informed Safety [PDF]

open access: yesComputer, 2016
Society relies on the safe functioning of computer based networks and systems whether it is in transportation, in energy production, banking or in medical devices. In some sectors, notably high hazard ones, achieving and assuring safety is a relatively mature undertaking - although of course we must not be complacent [20,21]. The advent of cyber issues
Robin Bloomfield, Kate Netkachova
openaire   +2 more sources

Impact of molecular diagnostics and targeted cancer therapy on patient outcomes (MODIFY): a retrospective study of the implementation of precision oncology

open access: yesMolecular Oncology, EarlyView.
The authors conducted a retrospective study of 94 patients with advanced cancer who underwent next‐generation sequencing (NGS) gene panel analysis and received targeted treatments when applicable. Results further support evidence indicating that molecular profiling provides clinical benefit.
Michaël Dang   +3 more
wiley   +1 more source

Comments on the Clique Number of Zero-Divisor Graphs of Zn

open access: yesJournal of Mathematics, 2022
In 2008, J. Skowronek-kazio´w extended the study of the clique number ωGZn to the zero-divisor graph of the ring Zn, but their result was imperfect. In this paper, we reconsider ωGZn of the ring Zn and give some counterexamples. We propose a constructive
Yanzhao Tian, Lixiang Li
doaj   +1 more source

Polyfunctional CD8+CD226+RUNX2hi effector T cells are diminished in advanced stages of chronic lymphocytic leukemia

open access: yesMolecular Oncology, EarlyView.
CD226+CD8+ T cells express elevated levels of RUNX2, exhibit higher proliferation capacity, cytokines and cytolytic molecules expression, and migratory capacity. In contrast, CD226−CD8+ T cells display an exhausted phenotype associated with the increased expression of co‐inhibitory receptors and impaired effector functions.
Maryam Rezaeifar   +4 more
wiley   +1 more source

MKTN: Adversarial-Based Multifarious Knowledge Transfer Network from Complementary Teachers

open access: yesInternational Journal of Computational Intelligence Systems
With the demands for light deep networks models in various front-end devices, network compression has attracted increasing interest for reducing model sizes yet without sacrificing much model accuracy.
Xiaobing Zhang   +3 more
doaj   +1 more source

Information Security management: A human challenge? [PDF]

open access: yes, 2008
This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a ...
Ashenden, Debi
core   +1 more source

Response to neoadjuvant chemotherapy in early breast cancers is associated with epithelial–mesenchymal transition and tumor‐infiltrating lymphocytes

open access: yesMolecular Oncology, EarlyView.
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane   +16 more
wiley   +1 more source

On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations [PDF]

open access: yesInternational Journal of Computer Network and Information Security(IJCNIS), 2019, 2019
A number of determinants predict the adoption of Information Systems (IS) security innovations. Amongst, perceived vulnerability of IS security threats has been examined in a number of past explorations. In this research, we examined the processes pursued in analysing the relationship between perceived vulnerability of IS security threats and the ...
arxiv   +1 more source

Information Warfare, Threats and Information Security

open access: yesMGIMO Review of International Relations, 2014
The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security.
M. A. Kazakov, D. N. Bespalov
openaire   +6 more sources

SCDIS-210 Information Security Technology Coverage Measurement Standards [PDF]

open access: yes, 2015
These standards establish a simplified and consistent measurement for coverage of each of the security technologies listed therein. These standards are to be used for all South Carolina state agencies, including institutions, departments, divisions ...
Division of Information Security, Division of Technology State of South Carolina – Information Security Program
core  

Home - About - Disclaimer - Privacy