Results 71 to 80 of about 3,479,617 (281)
Exploring homogeneous dense groups is one of the important issues in social network structure measurement. k-core decomposition and core member filtering are common methods to uncover homogeneous dense groups in a network.
Zeyu Zhang +7 more
doaj +1 more source
Quantum cryptography: a practical information security perspective [PDF]
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G. +2 more
core +1 more source
Epigenetic reprogramming in hematopoietic stem and progenitor cells (HSPCs) and downstream myeloid cells, mediated by H3.3 downregulation and endogenous retroelement (ERE) overexpression, contributes to the progression of multiple sclerosis (MS). ABSTRACT Background Skewed myelopoiesis in the bone marrow has been identified as a key driver of multiple ...
Li‐Mei Xiao +6 more
wiley +1 more source
Information Security Methodology, Replication Studies and Information Security Education [PDF]
Wendzel, S. +5 more
openaire +5 more sources
The Darknet marketplace, operating on anonymous communication techniques, has become a central hub for illicit trade, enabling elusive vendors to engage in illegal activities.
Xuan Zhang +6 more
doaj +1 more source
Nonmalleable Information Flow: Technical Report
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen +2 more
core +1 more source
Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li +10 more
wiley +1 more source
Detection of Electric Network Frequency in Audio Using Multi-HCNet
With the increasing application of electrical network frequency (ENF) in forensic audio and video analysis, ENF signal detection has emerged as a critical technology.
Yujin Li +6 more
doaj +1 more source
Audit for Information Systems Security [PDF]
The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they ...
Ana-Maria SUDUC +2 more
core
An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations
With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous ...
H.Chen, H.Wang, R.Roman
core +1 more source

