Results 51 to 60 of about 536,772 (338)
As network systems become larger and more complex, there is an increasing focus on how to verify the security of systems that are at risk of being attacked. Automated penetration testing is one of the effective ways to achieve this. Uncertainty caused by
Xiaojian Liu +3 more
doaj +1 more source
GBM radiosensitizers: dead in the water…or just the beginning? [PDF]
The finding that most GBMs recur either near or within the primary site after radiotherapy has fueled great interest in the development of radiosensitizers to enhance local control.
Bindra, Ranjit S. +3 more
core +1 more source
ABSTRACT Arteriovenous malformations (AVMs) are rare, high‐flow, vascular anomalies that can occur either sporadically or as part of a genetic syndrome. AVMs can progress with serious morbidity and even mortality if left unchecked. Sirolimus is an mTOR inhibitor that is effective in low‐flow vascular malformations; however, its role in AVMs is unclear.
Will Swansson +3 more
wiley +1 more source
Cybersecurity Testing for Automotive Domain: A Survey
Modern vehicles are more complex and interconnected than ever before, which also means that attack surfaces for vehicles have increased significantly.
Feng Luo +6 more
doaj +1 more source
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski +9 more
wiley +1 more source
The invention of smartphones has opened a new market for mobile application development. Amateur android app developers often do not possess knowledge of the latest android vulnerabilities and thus create applications with attack surface that hackers ...
Ikram Ul Haq, Tamim Ahmed Khan
doaj +1 more source
Depth of penetration effects in eddy current testing [PDF]
The simple depth of penetration equation used for most eddy current calculations does not take into account the effect of the size of the coil or the effect of flaw morphology. The work described in this paper describes use of the CIVA eddy current model
Majidnia, S, Nilavalan, R, Rudlin, J
core
Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright +13 more
wiley +1 more source
Internet of Things (IoT) devices are common in today’s computer networks. These devices can be computationally powerful, yet prone to cybersecurity exploitation.
Thomas Schiller +3 more
doaj +1 more source
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim +8 more
wiley +1 more source

