Results 51 to 60 of about 1,030,469 (325)
The relevance of the study is due to the need for effective protection of information systems in the face of ever-growing cyber threats. In the modern digital world, where cyberattacks are becoming increasingly complex and widespread, the use of ...
Роман Пантюшенко +1 more
doaj +1 more source
Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces
The rapid expansion of digital twin technology has revolutionized management and testing across various sectors, particularly in safeguarding critical infrastructure like smart grids.
Luigi Coppolino +3 more
doaj +1 more source
Designing the venue logistics management operations for a World Exposition [PDF]
World Expositions, due to their size and peculiar features, pose a number of logistics challenges. This paper aims at developing a design framework for the venue logistics management (VLM) operations to replenish food products to the event site, through ...
Colicchia, Claudia +2 more
core +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
The Cyber Security Incident Response Team executes its critical duties in the Centralized Security Operation Centers. Its primary target is to protect organizational resources from all types of Advanced Persistent Threats (APTs) and attacks while making ...
Gauhar Ali +2 more
doaj +1 more source
Detection of Current Attacks in Active Directory Environment with Log Correlation Methods
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate systems
Mehmet Sabri Elmastaş
doaj
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande +11 more
wiley +1 more source
Privacy and Security Management in Intelligent Transportation System
Metropolitan transportation is a dynamic and non-linear complex system. In such a system, there are possibilities of altering, monitoring, forging, and accessing private, public, and resource information of depot staff and communicating agents by ...
Suresh Chavhan +5 more
doaj +1 more source
Among current global threats, the risk of developing an emergency requires a comprehensive approach from all entities involved in crisis management. Despite the advanced technologies available to predict each threat, taking appropriate countermeasures is
Krzysztof Goniewicz
doaj +1 more source
Assessment of crisis readiness to move a patient from the airport with suspected Ebola [PDF]
The aim of this article is to verify the readiness of patient transport from the airport with symptoms for Ebola disease by the rescue services of the Integrated Rescue System of the Czech Republic.
Blahová, Marta, Hromada, Martin
core +1 more source

