Results 51 to 60 of about 5,525,844 (353)
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source
Security dialogues: building better relationships between security and business [PDF]
In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes.
Ashenden, Debi, Lawrence, Darren
core +1 more source
Workflow of a high‐throughput technology for epigenotyping of differentially methylated CpGs in specific regions of the genome. The protocol works with small amounts of DNA extracted from blood or semen. The protocol consists of both enzymatic conversion of unmethylated cytosines and capture by hybridization with a custom panel.
Nathalie Iannuccelli +4 more
wiley +1 more source
Thrombolytic proteins profiling: High‐throughput activity, selectivity, and resistance assays
We present optimized biochemical protocols for evaluating thrombolytic proteins, enabling rapid and robust screening of enzymatic activity, inhibition resistance, and fibrin affinity, stimulation, and selectivity. The outcome translates to key clinical indicators such as biological half‐life and bleeding risk. These assays streamline the development of
Martin Toul +3 more
wiley +1 more source
Feature Graph Construction With Static Features for Malware Detection
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou +6 more
doaj +1 more source
Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin +4 more
doaj +1 more source
Multimodal Autonomic Biomarkers Predict Phenoconversion in Pure Autonomic Failure
ABSTRACT Background Pure autonomic failure (PAF) presents with autonomic failure without other neurological features. A third develop central neurological features, fulfilling criteria for multiple system atrophy (MSA) and Lewy body diseases (LBD), including Parkinson's disease and Dementia with Lewy bodies.
S. Koay +12 more
wiley +1 more source
Arctic security in international security
Peace and war in the Arctic security is driven by international systemic forces of great power conflict. Since the Seven Years’ War (1756-1763) the geostrategic role of and thinking about the North Atlantic Arctic has been stable. The Napoleonic Wars, Crimean War, World War I and II and the Cold War affected the Arctic for geostrategic reasons. Current
openaire +3 more sources
According to eMarketer researchers, the total number of smartphones in active use on the planet exceeded the 2 billion unit in 2016 and amounted up to 2.16 billion against 1.9 billion in 2015 and 1.6 billion devices in 2014.
Mamienko, Sergey +2 more
core
Symbolic Quantitative Information Flow [PDF]
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords ...
Malacaria, P +3 more
core +1 more source

