Results 61 to 70 of about 175,312 (289)
Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers
This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while ...
Zhihui Shang +6 more
doaj +1 more source
In "History on the Run: Secrecy, Fugitivity, and Hmong Refugee Epistemologies," Ma Vang deftly answers the question of how one can “recount a history that has systematically been kept secret” by centering Hmong refugees as sources of knowledge and ...
Aline Lo
doaj +1 more source
Pengaturan Rahasia Bank (Bank Secrecy) di Indonesia (Studi Perbandingan Bank Secrecy di Thailand)
Bank adalah badan usaha yang menghimpun dana dari masyarakat dalam bentuk simpanan dan menyalurkannya kepada masyarakat dalam bentuk kredit dan atau bentuk-bentuk lainnya dalam rangka meningkatkan taraf hidup rakyat banyak. Bank sebagai lembaga perantara keuangan, harus menjaga kepercayaan masyarakat yang telah diberikan kepadanya dengan menjamin ...
openaire +1 more source
Role-Playing Game for Studying User Behaviors in Security: A Case Study on Email Secrecy [PDF]
Understanding the capabilities of adversaries (e.g., how much the adversary knows about a target) is important for building strong security defenses. Computing an adversary's knowledge about a target requires new modeling techniques and experimental methods.
Kui Xu +4 more
openaire +1 more source
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris +10 more
wiley +1 more source
As the verse chosen as a title for this article emblematically shows, esoteric movements have consistently used secrecy as a literary topos in their oral and written cultural expressions for a number of purposes.
Carola Erika Lorea
doaj +1 more source
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani +6 more
wiley +1 more source
The Rhetorical Algorithm: WikiLeaks and the Elliptical Secrets of Donald J. Trump
Algorithms were a generative force behind many of the leaks and secrets that dominated the 2016 election season. Taking the form of the identity-anonymizing Tor software that protected the identity of leakers, mathematical protocols occupied a prominent ...
Atilla Hallsby
doaj
This paper studies the effectiveness of intelligent reflecting surface (IRS) in enabling robust secure communications for indoor non-orthogonal multiple access (NOMA) systems. Using an IRS-control and power-allocation (PA) strategy (IRSCaPAS), the system
Van Phu Tuan, Ic-Pyo Hong
doaj +1 more source
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source

