Results 31 to 40 of about 2,209,260 (308)

Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK

open access: yes, 2019
Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today's online users.
Bittleston, Daniel   +7 more
core   +1 more source

Organoids in pediatric cancer research

open access: yesFEBS Letters, EarlyView.
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley   +1 more source

DIVERSION PRACTICES IN JUVENILE TRAFFIC CRIME INVESTIGATIONS AS A SOCIAL ENGINEERING TOOL: A CASE IN NORTH MALUKU, INDONESIA

open access: yesCepalo
Diversion as an alternative to out-of-court settlement faced both theoretical and practical challenges. In the context of traffic offenses committed by minors, the practice of diversion encountered legal uncertainties about whether it could effectively ...
Syawal Abdulajid   +3 more
doaj   +1 more source

An Intelligent Penetration Test Simulation Environment Construction Method Incorporating Social Engineering Factors

open access: yesApplied Sciences, 2022
The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research ...
Yang Li   +4 more
doaj   +1 more source

Spatiotemporal and quantitative analyses of phosphoinositides – fluorescent probe—and mass spectrometry‐based approaches

open access: yesFEBS Letters, EarlyView.
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho   +3 more
wiley   +1 more source

A Hybrid Neural Network Transformer for Detecting and Classifying Destructive Content in Digital Space

open access: yesAlgorithms
Cybersecurity remains a key challenge in the development of intelligent telecommunications systems and the Internet of Things (IoT). The growing destructive impact of the digital environment, coupled with high-performance computing (HPC), requires the ...
Aleksandr Chechkin   +2 more
doaj   +1 more source

Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10

open access: yesFEBS Letters, EarlyView.
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang   +8 more
wiley   +1 more source

You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks

open access: yesIEEE Access, 2016
Semantic social engineering attacks are a pervasive threat to computer and communication systems. By employing deception rather than by exploiting technical vulnerabilities, spear-phishing, obfuscated URLs, drive-by downloads, spoofed websites, scareware,
Ryan Heartfield   +2 more
doaj   +1 more source

Piety role in reforming society [PDF]

open access: yesزن در فرهنگ و هنر, 2013
This paper aims to show the impact of fear of God, as one of the most important signs of religious spirituality, on improving sexual and gender relationships in family and society as well as other social relationships and thus to offer some procedures ...
Hosein Bostan (Najafi)
doaj   +1 more source

Social Embeddedness and Agent Development [PDF]

open access: yes, 1998
Two different reasons for using agents are distinguished: the `engineering' perspective and the `social simulation' perspective. It is argued that this entails some differences in approach.
Edmonds, Bruce
core  

Home - About - Disclaimer - Privacy