Results 71 to 80 of about 4,851,518 (333)
The Formal Metabasis For Conformity Assessment of Information Security Software and Hardware [PDF]
An approach to the development of security test procedures for information security controls is presented.
arxiv
Abstract This study compared three Brainlab thermoplastic masks—Cranial 4pi basic, stereotactic (Close Mask V2), and open‐face—to see how well they limited head movement during Stereotactic Radiosurgery (SRS). Using a head phantom, we tested rotational movements (pitch, yaw, and roll) and measured displacements with the ExacTrac system.
Iris Pasion Apale+2 more
wiley +1 more source
A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs [PDF]
Programmers use security APIs to embed security into the applications they develop. Security vulnerabilities get introduced into those applications, due to the usability issues that exist in the security APIs. Improving usability of security APIs would contribute to improve the security of applications that programmers develop. However, currently there
arxiv
Smells and Refactorings for Microservices Security: A Multivocal Literature Review [PDF]
Context: Securing microservice-based applications is crucial, as many IT companies are delivering their businesses through microservices. If security smells affect microservice-based applications, they can possibly suffer from security leaks and need to be refactored to mitigate the effects of security smells therein.
arxiv
Identifying Trace Evidence from Target-Specific Data Wiping Application Software [PDF]
One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence.
Carlton, Gregory H., Kessler, Gary C.
core +1 more source
Development of a generic focal spot measurement method suitable for bore‐type linacs
Abstract Purpose In linear accelerators, deviations in the x‐ray focal spot position significantly affect the accuracy of radiation therapy. However, as the focal spot position in bore‐type linac systems such as the Radixact system, cannot be assessed using conventional methods, a new evaluation method is required.
Hidetoshi Shimizu+5 more
wiley +1 more source
Influence Maximization with Priority in Online Social Networks
The Influence Maximization (IM) problem, which finds a set of k nodes (called seedset) in a social network to initiate the influence spread so that the number of influenced nodes after propagation process is maximized, is an important problem in ...
Canh V. Pham+4 more
doaj +1 more source
Symbolic Quantitative Information Flow [PDF]
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords ...
Malacaria, P+3 more
core +1 more source
Abstract Purpose Breast cancer is a neoplastic disease with high prevalence among women. Radiotherapy is one of the principal treatment modalities for this disease, but it poses significant challenges. This study aimed to compare and evaluate the technical and dosimetric performance of conventional C‐arm linac systems and a new design, Halcyon, in the ...
Mustafa Çağlar+8 more
wiley +1 more source
DyCARS: A dynamic context-aware recommendation system
Dynamic recommendation systems aim to achieve real-time updates and dynamic migration of user interests, primarily utilizing user-item interaction sequences with timestamps to capture the dynamic changes in user interests and item attributes.
Zhiwen Hou+7 more
doaj +1 more source