Results 81 to 90 of about 849,170 (338)
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it ...
Bruce Ndibanje +2 more
doaj +1 more source
TrusNet: Peer-to-Peer Cryptographic Authentication [PDF]
Originally, the Internet was meant as a general purpose communication protocol, transferring primarily text documents between interested parties. Over time, documents expanded to include pictures, videos and even web pages.
Bedard, Adrian, Bedard, Jonathan
core +1 more source
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast.
Murty, Ch. A. S +1 more
core +1 more source
ABSTRACT Background There is growing recognition of the potential of plasma proteomics for Alzheimer's Disease (AD) risk assessment and disease characterization. However, differences between proteomics platforms introduce uncertainties regarding cross‐platform applicability.
Manyue Hu +9 more
wiley +1 more source
Changes in Immune‐Inflammation Status and Acute Ischemic Stroke Prognosis in Prospective Cohort
ABSTRACT Background Inflammation is a critical risk factor for poor outcomes in cerebral infarction. Prior studies focused primarily on baseline inflammation status, neglecting dynamic longitudinal changes. We try to investigate the association between immune‐inflammation status alterations and stroke prognosis, and evaluated three systemic biomarkers'
Songfang Chen +11 more
wiley +1 more source
Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world.
Madiha Khalid +2 more
doaj +1 more source
Applying an Ethical Lens to the Treatment of People With Multiple Sclerosis
ABSTRACT The practice of neurology requires an understanding of clinical ethics for decision‐making. In multiple sclerosis (MS) care, there are a wide range of ethical considerations that may arise. These involve shared decision‐making around selection of a disease‐modifying therapy (DMT), risks and benefits of well‐studied medications in comparison to
Methma Udawatta, Farrah J. Mateen
wiley +1 more source
RAARPL: End‐to‐end Reliability‐Aware Adaptive RPL routing protocol for Internet of things [PDF]
Parisa Shahbakhsh +2 more
openalex +1 more source
ABSTRACT Objective To delineate specific in vivo white matter pathology in neuronal intranuclear inclusion disease (NIID) using diffusion spectrum imaging (DSI) and define its clinical relevance. Methods DSI was performed on 42 NIID patients and 38 matched controls.
Kaiyan Jiang +10 more
wiley +1 more source
Enhancing Industrial Communication with Ethernet/Internet Protocol: A Study and Analysis of Real-Time Cooperative Robot Communication and Automation via Transmission Control Protocol/Internet Protocol. [PDF]
Seong J, Ranjan R, Kye J, Lee S, Lee S.
europepmc +1 more source

