Results 51 to 60 of about 5,525,844 (353)

Towards Security Goals in Summative E-Assessment Security

open access: yes, 2009
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core   +1 more source

Security dialogues: building better relationships between security and business [PDF]

open access: yes, 2016
In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes.
Ashenden, Debi, Lawrence, Darren
core   +1 more source

An optimized protocol to detect high‐throughput DNA methylation from custom targeted sequences on 96 samples simultaneously

open access: yesFEBS Open Bio, EarlyView.
Workflow of a high‐throughput technology for epigenotyping of differentially methylated CpGs in specific regions of the genome. The protocol works with small amounts of DNA extracted from blood or semen. The protocol consists of both enzymatic conversion of unmethylated cytosines and capture by hybridization with a custom panel.
Nathalie Iannuccelli   +4 more
wiley   +1 more source

Thrombolytic proteins profiling: High‐throughput activity, selectivity, and resistance assays

open access: yesFEBS Open Bio, EarlyView.
We present optimized biochemical protocols for evaluating thrombolytic proteins, enabling rapid and robust screening of enzymatic activity, inhibition resistance, and fibrin affinity, stimulation, and selectivity. The outcome translates to key clinical indicators such as biological half‐life and bleeding risk. These assays streamline the development of
Martin Toul   +3 more
wiley   +1 more source

Feature Graph Construction With Static Features for Malware Detection

open access: yesIET Information Security
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou   +6 more
doaj   +1 more source

Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification

open access: yesSensors, 2023
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin   +4 more
doaj   +1 more source

Multimodal Autonomic Biomarkers Predict Phenoconversion in Pure Autonomic Failure

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Pure autonomic failure (PAF) presents with autonomic failure without other neurological features. A third develop central neurological features, fulfilling criteria for multiple system atrophy (MSA) and Lewy body diseases (LBD), including Parkinson's disease and Dementia with Lewy bodies.
S. Koay   +12 more
wiley   +1 more source

Arctic security in international security

open access: yes, 2020
Peace and war in the Arctic security is driven by international systemic forces of great power conflict. Since the Seven Years’ War (1756-1763) the geostrategic role of and thinking about the North Atlantic Arctic has been stable. The Napoleonic Wars, Crimean War, World War I and II and the Cold War affected the Arctic for geostrategic reasons. Current
openaire   +3 more sources

Smartphone security [PDF]

open access: yes, 2017
According to eMarketer researchers, the total number of smartphones in active use on the planet exceeded the 2 billion unit in 2016 and amounted up to 2.16 billion against 1.9 billion in 2015 and 1.6 billion devices in 2014.
Mamienko, Sergey   +2 more
core  

Symbolic Quantitative Information Flow [PDF]

open access: yes, 2012
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords ...
Malacaria, P   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy