Results 41 to 50 of about 2,195,820 (278)

Classifying Swahili Smishing Attacks for Mobile Money Users: A Machine-Learning Approach

open access: yesIEEE Access, 2022
Due to the massive adoption of mobile money in Sub-Saharan countries, the global transaction value of mobile money exceeded $\$ $ 2 billion in 2021. Projections show transaction values will exceed $\$ $ 3 billion by the end of 2022, and Sub-Saharan ...
Iddi S. Mambina   +2 more
doaj   +1 more source

Social Embeddedness and Agent Development [PDF]

open access: yes, 1998
Two different reasons for using agents are distinguished: the `engineering' perspective and the `social simulation' perspective. It is argued that this entails some differences in approach.
Edmonds, Bruce
core  

Case Study On Social Engineering Techniques for Persuasion [PDF]

open access: yes, 2010
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin   +2 more
core   +3 more sources

An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots

open access: yesFEBS Letters, EarlyView.
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino   +7 more
wiley   +1 more source

Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach

open access: yesIEEE Access, 2019
In the field of information security, there are several areas of study that are under development. Social engineering is one of them that addresses the multidisciplinary challenges of cyber security.
Patricio Zambrano   +6 more
doaj   +1 more source

The Design and Evaluation of an Interactive Social Engineering Training Programme [PDF]

open access: yes, 2016
Social engineering is a major issue affecting organisational security. Educating employees on how to avoid social engineering attacks is important because social engineering tries to penetrate an organisation by using employees to grant authorized ...
Alkhamis, Esra, Renaud, Karen
core  

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Hematopoietic (stem) cells—The elixir of life?

open access: yesFEBS Letters, EarlyView.
The aging of HSCs (hematopoietic stem cells) and the blood system leads to the decline of other organs. Rejuvenating aged HSCs improves the function of the blood system, slowing the aging of the heart, kidney, brain, and liver, and the occurrence of age‐related diseases.
Emilie L. Cerezo   +4 more
wiley   +1 more source

Social Engineering—The Hidden Control

open access: yesProceedings, 2020
The former energy-wasting lifestyles of developed societies can no longer be sustained. In our age, efficiency is the key to continued sustainability. Increasing efficiency requires the use of infocommunication systems and their regulation.
Edina Albininé Budavári   +1 more
doaj   +1 more source

Countering Social Engineering through Social Media: An Enterprise Security Perspective

open access: yes, 2015
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities.
C Colwill   +8 more
core   +1 more source

Home - About - Disclaimer - Privacy