Results 21 to 30 of about 1,717,630 (292)

A machine learning-based approach to ERα bioactivity and drug ADMET prediction

open access: yesFrontiers in Genetics, 2023
By predicting ERα bioactivity and mining the potential relationship between Absorption, Distribution, Metabolism, Excretion, Toxicity (ADMET) attributes in drug research and development, the development efficiency of specific drugs for breast cancer will
Tianbo An   +6 more
doaj   +1 more source

Measurement-device-independent quantum communication with an untrusted source [PDF]

open access: yes, 2015
Measurement-device-independent quantum key distribution (MDI-QKD) can provide enhanced security, as compared to traditional QKD, and it constitutes an important framework for a quantum network with an untrusted network server.
Xu, Feihu
core   +2 more sources

Security risk assessment of projects in high-risk areas based on attack-defense game model

open access: yesScientific Reports, 2023
Assessing the security risk of projects in high-risk areas is particularly important. This paper develops a security risk assessment model for projects in high-risk areas based on the target loss probability model and Bayesian game model.
Yifan Yao, Wenjing Chen
doaj   +1 more source

Spatial co-location pattern mining based on the improved density peak clustering and the fuzzy neighbor relationship

open access: yesMathematical Biosciences and Engineering, 2021
Spatial co-location pattern mining discovers the subsets of spatial features frequently observed together in nearby geographic space. To reduce time and space consumption in checking the clique relationship of row instances of the traditional co-location
Meijiao Wang   +3 more
doaj   +1 more source

A trustworthy mobile agent infrastructure for network management [PDF]

open access: yes, 2007
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core   +1 more source

Inhibiting crypto‐ransomware on windows platforms through a honeyfile‐based approach with R‐Locker

open access: yesIET Information Security, 2022
After several years, crypto‐ransomware attacks still constitute a principal threat for individuals and organisations worldwide. Despite the fact that a number of solutions are deployed to fight against this plague, one main challenge is that of early ...
José Antonio Gómez‐Hernández   +2 more
doaj   +1 more source

Providing Authentication & Authorization Mechanisms for Active Service Charging [PDF]

open access: yes, 2002
Active network technology enables fast deployment of new network services tailored to the specific needs of end users, among others features.
Alarcos, Bernardo   +3 more
core   +3 more sources

HBTBD: A Heterogeneous Bitcoin Transaction Behavior Dataset for Anti-Money Laundering

open access: yesApplied Sciences, 2023
In this paper, we predict money laundering in Bitcoin transactions by leveraging a deep learning framework and incorporating more characteristics of Bitcoin transactions.
Jialin Song, Yijun Gu
doaj   +1 more source

Effects of Degree Correlations in Interdependent Security: Good or Bad?

open access: yes, 2017
We study the influence of degree correlations or network mixing in interdependent security. We model the interdependence in security among agents using a dependence graph and employ a population game model to capture the interaction among many agents ...
La, Richard J.
core   +1 more source

Lightweight Security for Network Coding

open access: yes, 2008
Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows.
Barros, Joao   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy