Results 41 to 50 of about 2,209,260 (308)

Traditional vocations and modern professions among Tamil Brahmans in colonial and post-colonial south India [PDF]

open access: yes, 2010
Since the nineteenth century, Tamil Brahmans have been very well represented in the educated professions, especially law and administration, medicine, engineering and nowadays, information technology.
Fuller, C. J., Narasimhan, Haripriya
core   +2 more sources

Function‐driven design of a surrogate interleukin‐2 receptor ligand

open access: yesFEBS Letters, EarlyView.
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang   +9 more
wiley   +1 more source

Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach

open access: yesIEEE Access, 2019
In the field of information security, there are several areas of study that are under development. Social engineering is one of them that addresses the multidisciplinary challenges of cyber security.
Patricio Zambrano   +6 more
doaj   +1 more source

Classifying Swahili Smishing Attacks for Mobile Money Users: A Machine-Learning Approach

open access: yesIEEE Access, 2022
Due to the massive adoption of mobile money in Sub-Saharan countries, the global transaction value of mobile money exceeded $\$ $ 2 billion in 2021. Projections show transaction values will exceed $\$ $ 3 billion by the end of 2022, and Sub-Saharan ...
Iddi S. Mambina   +2 more
doaj   +1 more source

The Design and Evaluation of an Interactive Social Engineering Training Programme [PDF]

open access: yes, 2016
Social engineering is a major issue affecting organisational security. Educating employees on how to avoid social engineering attacks is important because social engineering tries to penetrate an organisation by using employees to grant authorized ...
Alkhamis, Esra, Renaud, Karen
core  

Countering Social Engineering through Social Media: An Enterprise Security Perspective

open access: yes, 2015
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities.
C Colwill   +8 more
core   +1 more source

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Sequence determinants of RNA G‐quadruplex unfolding by Arg‐rich regions

open access: yesFEBS Letters, EarlyView.
We show that Arg‐rich peptides selectively unfold RNA G‐quadruplexes, but not RNA stem‐loops or DNA/RNA duplexes. This length‐dependent activity is inhibited by acidic residues and is conserved among SR and SR‐related proteins (SRSF1, SRSF3, SRSF9, U1‐70K, and U2AF1).
Naiduwadura Ivon Upekala De Silva   +10 more
wiley   +1 more source

The Naming Game in Social Networks: Community Formation and Consensus Engineering

open access: yes, 2010
We study the dynamics of the Naming Game [Baronchelli et al., (2006) J. Stat. Mech.: Theory Exp. P06014] in empirical social networks. This stylized agent-based model captures essential features of agreement dynamics in a network of autonomous agents ...
A Bray   +50 more
core   +2 more sources

Home - About - Disclaimer - Privacy