Results 51 to 60 of about 1,765,999 (278)
Outsmarting Network Security with SDN Teleportation
Software-defined networking is considered a promising new paradigm, enabling more reliable and formally verifiable communication networks. However, this paper shows that the separation of the control plane from the data plane, which lies at the heart of ...
Schiff, Liron +2 more
core +1 more source
Objective Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition with widely varying global prevalence estimates. The frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the United States or United Kingdom, at 19 to 39 per 100,000 as opposed ...
Lucinda Roper +7 more
wiley +1 more source
Design of Linkable Ring Signature Scheme Based on the MP-LWE Problem and Its Application in IoV
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks.
Lansheng Han, Wei Liao, Peng Chen
doaj +1 more source
As one of the top ten security threats faced by artificial intelligence, the adversarial attack has caused scholars to think deeply from theory to practice.
Fangwei Wang +4 more
doaj +1 more source
A Hybrid Multi-Scale Transformer-CNN UNet for Crowd Counting
Crowd counting is a critical computer vision task with significant applications in public security and smart city systems. While deep learning has markedly improved accuracy, persistent challenges include extreme scale variations, severe occlusion, and ...
Kai Zhao +3 more
doaj +1 more source
The security of NTP's datagram protocol [PDF]
For decades, the Network Time Protocol (NTP) has been used to synchronize computer clocks over untrusted network paths. This work takes a new look at the security of NTP’s datagram protocol.
Gardner, Jonathan +5 more
core +2 more sources
Objectives This study aimed to describe real‐world trends in preconception and prenatal use of antirheumatic drugs among pregnant individuals with rheumatic diseases in Ontario, Canada. Methods We conducted a time‐series analysis using repeated cross‐sectional data to examine annual patterns of disease‐modifying antirheumatic drug (DMARD) use among ...
Shenthuraan Tharmarajah +6 more
wiley +1 more source
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability.
Canling Wang +8 more
doaj +1 more source
A taxonomy of malicious traffic for intrusion detection systems [PDF]
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert +5 more
core +4 more sources
Phase Field Failure Modeling: Brittle‐Ductile Dual‐Phase Microstructures under Compressive Loading
The approach by Amor and the approach by Miehe and Zhang for asymmetric damage behavior in the phase field method for fracture are compared regarding their fitness for microcrack‐based failure modeling. The comparison is performed for the case of a dual‐phase microstructure with a brittle and a ductile constituent.
Jakob Huber, Jan Torgersen, Ewald Werner
wiley +1 more source

