Results 281 to 290 of about 1,030,469 (325)
A multicenter, single-arm clinical trial of an assertive case management intervention for preventing suicide reattempts at psychiatric hospitals in Japan: ACTION-JP study. [PDF]
Ishibashi R +12 more
europepmc +1 more source
The State of Practice About Security in Telemedicine Systems in Chile: Exploratory Study.
Marquez G +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
International Conference on Internet of Things and Intelligence System, 2023
Web applications face increasing security threats, with a 210% rise in attacks in 2022 compared to 2020, including 172 daily attacks per website and 2,306 weekly bot accesses.
Tia Rahmawati +5 more
semanticscholar +1 more source
Web applications face increasing security threats, with a 210% rise in attacks in 2022 compared to 2020, including 172 daily attacks per website and 2,306 weekly bot accesses.
Tia Rahmawati +5 more
semanticscholar +1 more source
International Conference on Recent Advances and Innovations in Engineering, 2023
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata +4 more
semanticscholar +1 more source
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata +4 more
semanticscholar +1 more source
International Conference Computing Engineering and Design, 2023
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks.
M. A. Ayu +3 more
semanticscholar +1 more source
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks.
M. A. Ayu +3 more
semanticscholar +1 more source
Implementing Dockerized Elastic Stack for Security Information and Event Management
International Conference on Information Technology, 2020In security information and event management (SIEM), real-time monitoring together with analysis of log data for correlation of events can provide anomaly detection and notification.
Ferdy Mulyadi +3 more
semanticscholar +1 more source
2025 Systems of Signals Generating and Processing in the Field of on Board Communications
The present article engages with the ongoing discourse surrounding the implementation of artificial intelligence and explainable artificial intelligence within the domain of information security systems.
Elena V. Bulgakova +3 more
semanticscholar +1 more source
The present article engages with the ongoing discourse surrounding the implementation of artificial intelligence and explainable artificial intelligence within the domain of information security systems.
Elena V. Bulgakova +3 more
semanticscholar +1 more source

