Results 41 to 50 of about 1,764,419 (291)

Host security assessment method based on attack graph

open access: yesTongxin xuebao, 2022
In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the
Hongyu YANG, Haihang YUAN, Liang ZHANG
doaj  

Directed Acyclic Graph-Based Blockchain Performance Analysis and Its Secure Operation in Opportunistic Networks

open access: yesIET Software
Directed acyclic graph (DAG)-based blockchain is a promising paradigm of a blockchain system. During DAG-based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks.
Ruilin Lai   +5 more
doaj   +1 more source

Security Assessment and Coordinated Emergency Control Strategy for Power Systems with Multi-Infeed HVDCs

open access: yesEnergies, 2020
Short-circuit faults in a receiving-end power system can lead to blocking events of the feed-in high-voltage direct-current (HVDC) systems, which may further result in system instability.
Qiufang Zhang   +5 more
doaj   +1 more source

The HIT Network for Children and Adolescents With CNS Tumors Facilitates Improvements of Diagnostic Assessments, Multimodal Treatments, Individual Counseling, and Research in Germany, Austria, and Switzerland

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski   +59 more
wiley   +1 more source

Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]

open access: yes, 2007
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core  

ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys [PDF]

open access: yes, 2010
Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature.
Arnedo Moreno, Joan   +6 more
core   +2 more sources

Efficacy and Tolerability of Topotecan/Cyclophosphamide/Dinutuximab in Relapsed and Refractory High‐Risk Neuroblastoma: A Multi‐Institutional Retrospective Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Chemoimmunotherapy with irinotecan, temozolomide, and dinutuximab (I/T/DIN) has emerged as first‐line therapy for relapsed/refractory (r/r) high‐risk neuroblastoma (HRNB) in North America. Topotecan and cyclophosphamide (T/C) are often used in combination with dinutuximab in the setting of lack of response, progression, or incomplete ...
Benjamin J. Lerman   +17 more
wiley   +1 more source

Calculation of the security level coefficient of the automated system of the internal affairs bodies based on the information security of the information security system with updates of virus and threat signatures

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2023
Objective. This paper considers protection against threats that occur more often in the period from the start of the operating system boot. Consideration of various configurations will allow an overview of a fairly wide range of situations that arise. To
A. O. Yefimov   +4 more
doaj   +1 more source

Comparison of the Efficiency of Budget Financing and the Social Security of a Region [PDF]

open access: yes, 2016
The article deals with theoretical and economic aspects of the “security” category and draws a distinction between philosophical, sociological, and economic approaches to the concept of social security.
Kuklin, A. A.   +2 more
core   +2 more sources

Conserved structural motifs in PAS, LOV, and CRY proteins regulate circadian rhythms and are therapeutic targets

open access: yesFEBS Letters, EarlyView.
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy