Results 31 to 40 of about 7,184,030 (395)
Bone metastatic carcinoma coexisting with plasma cell myeloma: a case report
Objective Multiple myeloma is a clonal plasma cell proliferation often causing bone lytic lesions. It is sometimes challenging to differentiate these lytic lesions associated with multiple myeloma from bone destruction due to a metastasis.
Marwa Aloui+5 more
doaj +1 more source
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns [PDF]
Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub Copilot, the software industry quickly utilized these tools for software development tasks, e.g., generating code or consulting AI for advice.
J. Klemmer+19 more
semanticscholar +1 more source
5G Security Threat Assessment in Real Networks
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of ...
Seongmin Park+5 more
doaj +1 more source
Particle Propagation Model for Dynamic Node Classification
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li+4 more
doaj +1 more source
Person Re-Identification Method Based on Dual Descriptor Feature Enhancement
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin+5 more
doaj +1 more source
Reve\{a,i\}ling the risks: a phenomenology of information security [PDF]
In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have.
Pieters, Wolter
core +4 more sources
Computer security and security technologies [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information.
Dragan Velickovic, Lazar Stošić
openaire +2 more sources
Impact of climate change on biodiversity and food security: a global perspective—a review article
Climate change is happening due to natural factors and human activities. It expressively alters biodiversity, agricultural production, and food security. Mainly, narrowly adapted and endemic species are under extinction.
Melese Genete Muluneh
semanticscholar +1 more source
This article investigates how modern neo-liberal states are 'securing by design' harnessing design to new technologies in order to produce security, safety, and protection.
Adorno+60 more
core +1 more source
IoT Security Configurability with Security-by-Contract [PDF]
Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions,
Alberto Giaretta+2 more
openaire +5 more sources