Results 41 to 50 of about 1,764,419 (291)
Host security assessment method based on attack graph
In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the
Hongyu YANG, Haihang YUAN, Liang ZHANG
doaj
Directed acyclic graph (DAG)-based blockchain is a promising paradigm of a blockchain system. During DAG-based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks.
Ruilin Lai +5 more
doaj +1 more source
Short-circuit faults in a receiving-end power system can lead to blocking events of the feed-in high-voltage direct-current (HVDC) systems, which may further result in system instability.
Qiufang Zhang +5 more
doaj +1 more source
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski +59 more
wiley +1 more source
Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core
ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys [PDF]
Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature.
Arnedo Moreno, Joan +6 more
core +2 more sources
ABSTRACT Purpose Chemoimmunotherapy with irinotecan, temozolomide, and dinutuximab (I/T/DIN) has emerged as first‐line therapy for relapsed/refractory (r/r) high‐risk neuroblastoma (HRNB) in North America. Topotecan and cyclophosphamide (T/C) are often used in combination with dinutuximab in the setting of lack of response, progression, or incomplete ...
Benjamin J. Lerman +17 more
wiley +1 more source
Objective. This paper considers protection against threats that occur more often in the period from the start of the operating system boot. Consideration of various configurations will allow an overview of a fairly wide range of situations that arise. To
A. O. Yefimov +4 more
doaj +1 more source
Comparison of the Efficiency of Budget Financing and the Social Security of a Region [PDF]
The article deals with theoretical and economic aspects of the “security” category and draws a distinction between philosophical, sociological, and economic approaches to the concept of social security.
Kuklin, A. A. +2 more
core +2 more sources
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman +2 more
wiley +1 more source

