Results 31 to 40 of about 2,209,260 (308)
Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK
Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today's online users.
Bittleston, Daniel +7 more
core +1 more source
Organoids in pediatric cancer research
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley +1 more source
Diversion as an alternative to out-of-court settlement faced both theoretical and practical challenges. In the context of traffic offenses committed by minors, the practice of diversion encountered legal uncertainties about whether it could effectively ...
Syawal Abdulajid +3 more
doaj +1 more source
The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research ...
Yang Li +4 more
doaj +1 more source
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho +3 more
wiley +1 more source
Cybersecurity remains a key challenge in the development of intelligent telecommunications systems and the Internet of Things (IoT). The growing destructive impact of the digital environment, coupled with high-performance computing (HPC), requires the ...
Aleksandr Chechkin +2 more
doaj +1 more source
Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang +8 more
wiley +1 more source
Semantic social engineering attacks are a pervasive threat to computer and communication systems. By employing deception rather than by exploiting technical vulnerabilities, spear-phishing, obfuscated URLs, drive-by downloads, spoofed websites, scareware,
Ryan Heartfield +2 more
doaj +1 more source
Piety role in reforming society [PDF]
This paper aims to show the impact of fear of God, as one of the most important signs of religious spirituality, on improving sexual and gender relationships in family and society as well as other social relationships and thus to offer some procedures ...
Hosein Bostan (Najafi)
doaj +1 more source
Social Embeddedness and Agent Development [PDF]
Two different reasons for using agents are distinguished: the `engineering' perspective and the `social simulation' perspective. It is argued that this entails some differences in approach.
Edmonds, Bruce
core

