Results 31 to 40 of about 1,187,761 (284)

Ontology Population for Open-Source Intelligence [PDF]

open access: yes, 2018
We present an approach based on GATE (General Architecture for Text Engineering) for the automatic population of ontologies from text documents. We describe some experimental results, which are encouraging in terms of extracted correct instances of the ...
Ganino, G.   +3 more
core  

Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports

open access: yes, 2018
Open-Source Projects and Libraries are being used in software development while also bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind of attack surface for a product in development.
Joshi, Anupam   +2 more
core   +1 more source

Assessing Cognitive Functioning in Children With Brain Tumors: Interaction of Neighborhood Social Determinants of Health and Neurological Risk

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich   +5 more
wiley   +1 more source

Organoids in pediatric cancer research

open access: yesFEBS Letters, EarlyView.
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley   +1 more source

Open Source Intelligence (OSINT) and the fog of war at the strategic level: Defence industrial production in Russia

open access: yesEuropean Journal of International Security
The war in Ukraine has increased attention to Open Source Intelligence (OSINT), though most research focuses on tactical use or effects on public opinion.
Oldřich Krpec   +2 more
doaj   +1 more source

Cluo: Web-Scale Text Mining System For Open Source Intelligence Purposes

open access: yesComputer Science, 2013
The amount of textual information published on the Internet is considered tobe in billions of web pages, blog posts, comments, social media updates andothers. Analyzing such quantities of data requires high level of distribution –both data and computing.
Przemyslaw Maciolek   +1 more
doaj   +1 more source

Can you identify violent extremists using a screening checklist and open-source intelligence alone? [PDF]

open access: yes, 2016
Checklist-based screening instruments have a role in the assessment of mentally disordered and criminal offenders, but their value for screening for vulnerability to violent extremism remains moot.
Alison, Emily   +6 more
core   +3 more sources

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Pentaho Business Analytics: a Business Intelligence Open Source Alternative [PDF]

open access: yesDatabase Systems Journal, 2012
Most organizations strive to obtain fast, interactive and insightful analytics in order to fundament the most effective and profitable decisions. They need to incorporate huge amounts of data in order to run analysis based on queries and reports with ...
Diana TÂRNĂVEANU
doaj  

Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions

open access: yesJournal of Cybersecurity and Privacy, 2021
As technology has become pivotal a part of life, it has also become a part of criminal life. Criminals use new technology developments to commit crimes, and investigators must adapt to these changes.
Cecelia Horan, Hossein Saiedian
doaj   +1 more source

Home - About - Disclaimer - Privacy