Results 71 to 80 of about 1,773,552 (288)

Game Theory Meets Network Security: A Tutorial at ACM CCS

open access: yes, 2018
The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and ...
Chen J.   +8 more
core   +1 more source

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

Patterns of Postictal Abnormalities in Relation to Status Epilepticus in Adults

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Abnormalities on peri‐ictal diffusion‐weighted magnetic resonance imaging (DWI‐PMAs) are well‐established for patients with status epilepticus (SE), but knowledge on patterns of DWI‐PMAs and their prognostic impact is sparse. Methods This systematic review and individual participant data meta‐analysis included observational studies ...
Andrea Enerstad Bolle   +11 more
wiley   +1 more source

Overview and prospect of 5G security

open access: yesDianxin kexue, 2020
From 4G to 5G,as the result of network evolution and service promotion,the concepts and principles of security in design were deeply integrated,the security capabilities were enhanced.The root of 5G security design-building secure networks and services ...
Zhiqiang YANG   +3 more
doaj  

A Review of CO2 Storage in View of Safety and Cost-Effectiveness

open access: yesEnergies, 2020
The emissions of greenhouse gases, especially CO2, have been identified as the main contributor for global warming and climate change. Carbon capture and storage (CCS) is considered to be the most promising strategy to mitigate the anthropogenic CO2 ...
Cheng Cao   +5 more
doaj   +1 more source

Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems [PDF]

open access: yes, 2016
There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation ...
Johnson, Christopher W.
core  

Efficient Database Generation for Data-driven Security Assessment of Power Systems

open access: yes, 2019
Power system security assessment methods require large datasets of operating points to train or test their performance. As historical data often contain limited number of abnormal situations, simulation data are necessary to accurately determine the ...
Chatzivasileiadis, Spyros   +3 more
core   +1 more source

Innate Immune Reprogramming Mediated by Endogenous Retroelement Dysregulation Drives Multiple Sclerosis Progression

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
Epigenetic reprogramming in hematopoietic stem and progenitor cells (HSPCs) and downstream myeloid cells, mediated by H3.3 downregulation and endogenous retroelement (ERE) overexpression, contributes to the progression of multiple sclerosis (MS). ABSTRACT Background Skewed myelopoiesis in the bone marrow has been identified as a key driver of multiple ...
Li‐Mei Xiao   +6 more
wiley   +1 more source

Influence of the human-machine-environment system on reliability automated systems IAB of the Russian Federation

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The article examines the influence of the “man-machine-environment” system on the reliability of automated systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov   +4 more
doaj   +1 more source

Applying Real Options Thinking to Information Security in Networked Organizations [PDF]

open access: yes, 2006
An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets.
Daneva, M.
core   +2 more sources

Home - About - Disclaimer - Privacy