Results 61 to 70 of about 7,114,774 (349)

Effectiveness and user experience of nose and throat swabbing techniques for SARS-CoV-2 detection: results from the UK COVID-19 National Testing Programme

open access: yesBMC Global and Public Health
Background The UK’s National Health Service Test and Trace (NHSTT) program aimed to provide the most effective and accessible SARS-CoV-2 testing approach possible.
Matthias E. Futschik   +18 more
doaj   +1 more source

The security of practical quantum key distribution [PDF]

open access: yes, 2008
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a ...
V. Scarani   +5 more
semanticscholar   +1 more source

Security Rules versus Security Properties [PDF]

open access: yes, 2010
There exist many approaches to specify and to define security policies. We present here a framework in which the basic components of security policies can be expressed, and we identify their role in the description of a policy, of a system and of a secure system.
openaire   +1 more source

Global Health Security: Security for whom? Security from what? [PDF]

open access: yesPolitical Studies, 2011
The concept of ‘health security’ has been increasingly apparent in recent years in both academic and policy discourses on transborder infectious disease threats. Yet it has been noted that there are a range of conceptualisations of ‘health security’ in circulation and that confusion over the concept is creating international tensions with some states (
openaire   +1 more source

Sustainable bioplastics manufacturing from renewable sources

open access: yesFEBS Open Bio, EarlyView.
Bioplastics are manufactured by using polymers from different bio‐based sources. These novel materials not only offer biodegradability but also possess various functional properties that make them suitable for diverse applications. Recent developments in the preparation of bioplastics are reported, highlighting the distinct properties of each type of ...
C. Valeria L. Giosafatto   +6 more
wiley   +1 more source

Web development evolution: the assimilation of web engineering security [PDF]

open access: yes, 2005
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core   +1 more source

Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham   +7 more
wiley   +1 more source

Feature Graph Construction With Static Features for Malware Detection

open access: yesIET Information Security
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou   +6 more
doaj   +1 more source

Exploratory Analysis of ELP1 Expression in Whole Blood From Patients With Familial Dysautonomia

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Familial dysautonomia (FD) is a hereditary neurodevelopmental disorder caused by aberrant splicing of the ELP1 gene, leading to a tissue‐specific reduction in ELP1 protein expression. Preclinical models indicate that increasing ELP1 levels can mitigate disease manifestations.
Alejandra González‐Duarte   +13 more
wiley   +1 more source

Complexity and Unwinding for Intransitive Noninterference [PDF]

open access: yes, 2013
The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows.
Eggert, Sebastian   +3 more
core  

Home - About - Disclaimer - Privacy