Results 61 to 70 of about 4,851,518 (333)
A Data Enhancement Algorithm for DDoS Attacks Using IoT
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly ...
Haibin Lv+4 more
doaj +1 more source
Validation of a multiplex amplification system of 19 autosomal STRs and 27 Y-STRs
This article describes a newly devised autosomal short tandem repeat (STR) multiplex polymerase chain reaction (PCR) system for 19 autosomal loci (D12S391, D13S317, D16S539, D18S51, D19S433, D2S1338, D21S11, D3S1358, D5S818, D6S1043, D7S820, D8S1179 ...
Feng Liu+4 more
doaj +1 more source
N-Trans: Parallel Detection Algorithm for DGA Domain Names
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang+4 more
doaj +1 more source
Considerations for Cloud Security Operations [PDF]
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv
5G wireless P2MP backhaul security protocol: an adaptive approach
5G has introduced various emerging demands for new services and technologies that raised the bar for quality of service, latency, handovers, and data rates.
Jiyoon Kim+4 more
doaj +1 more source
National climate, agriculture and socio-economic development policies and plans formulated with the use of scenarios across six global regions [PDF]
Climate change impacts bring great uncertainty, raising the need to plan for the future. As the impacts of climate change are complex and far-reaching, it can be extremely difficult to foresee exactly what the consequences will be, and how they will ...
CGIAR Research Program on Climate Change, Agriculture and Food Security
core
Abstract This study aimed to evaluate the dose‐exposure reduction effect of a crystalline lens with a bismuth eye shield using cone‐beam computed tomography (CBCT) for head image‐guided radiation therapy. The ocular surface dose of the head phantom (THRA‐1) is defined as a crystalline lens exposure dose and is measured using a radiophotoluminescence ...
Tatsuya Yoshida+5 more
wiley +1 more source
Principle of Need-to-Act [PDF]
In this paper, we have introduced the notion of "Principle of Need-to- Act". This principle is essential towards developing secure systems, security solutions and analyzing security of a solution.
arxiv
Background Shiga toxin-producing Escherichia coli (STEC) infections are a significant public health concern as they can cause serious illness and outbreaks.
Amoolya Vusirikala+12 more
doaj +1 more source
Abstract Purpose This study compares the dosimetric accuracy of deep‐learning‐based MR synthetic CT (sCT) in brain radiotherapy between the Analytical Anisotropic Algorithm (AAA) and AcurosXB (AXB). Additionally, it proposes a novel metric to predict the dosimetric accuracy of sCT for individual post‐surgical brain cases.
Jeffrey C. F. Lui+3 more
wiley +1 more source