Results 71 to 80 of about 2,010,621 (347)
While autonomous driving systems and intelligent transportation infrastructures become increasingly software-defined and network-connected, ensuring their cybersecurity has become a critical component of traffic safety.
Xingyu Wu +8 more
doaj +1 more source
A Multi-Component Analysis of CPTED in the Cyberspace Domain
The visual fidelity of a virtual environment lacks the exceedingly complex layers from the physical world, but the continuous improvements of image rendering technology and computation powers have led to greater demands for virtual simulations. Our study
Jemin Justin Lee +7 more
doaj +1 more source
Disposition toward privacy and information disclosure in the context of emerging health technologies. [PDF]
ObjectiveWe sought to present a model of privacy disposition and its development based on qualitative research on privacy considerations in the context of emerging health technologies.Materials and methodsWe spoke to 108 participants across 44 interviews
Bloss, Cinnamon S +5 more
core +1 more source
Context-Aware Generative Adversarial Privacy
Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often
Chen, Xiao +4 more
core +2 more sources
In normal (nontolerant) cells, CD14 is crucial for both LPS uptake and LPS signaling. In LPS‐tolerant cells, in which LPS‐induced TNF‐α and IFN‐β production is suppressed, there is a dramatic increase in surface CD14 expression. The overexpressed CD14 in LPS‐tolerant cells is responsible for the enhanced LPS uptake without inducing pro‐inflammatory ...
Saeka Nishihara +3 more
wiley +1 more source
Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives
The fifth generation (5G) technology offers a set of security services in order to provide secure communication to a large number of various devices. 5G Authentication and Key Agreement (5G-AKA) authentication service acts as the first step of securing ...
Lili Jiang +5 more
doaj +1 more source
Privacy loss is central to privacy law scholarship, but a clear definition of the concept remains elusive. We present a model that both captures the essence of privacy loss and can be easily applied to policy evaluations and doctrinal debates. To do so, we use standard Bayesian statistics to formalize a key intuition: that information privacy is ...
Cofone, Ignacio N. N. +1 more
openaire +4 more sources
Privacy violations in online social networks (OSNs) often arise as a result of users sharing information with unintended audiences. One reason for this is that, although OSN capabilities for creating and managing social groups can make it easier to be selective about recipients of a given post, they do not provide enough guidance to the users to make ...
Calikli, Gul +8 more
openaire +3 more sources
This systematic review synthesizes prognostic models for survival and recurrence in resected non‐small cell lung cancer. While many models demonstrate moderate to good discrimination, few are externally validated and reporting quality is variable, limiting clinical applicability and highlighting the need for robust, transparent model development ...
Evangeline Samuel +4 more
wiley +1 more source
Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham +7 more
wiley +1 more source

