Results 101 to 110 of about 226,022 (290)

Correction to: Social Engineering Attacks During the COVID-19 Pandemic. [PDF]

open access: yesSN Comput Sci, 2021
Venkatesha S, Reddy KR, Chandavarkar BR.
europepmc   +1 more source

Variably Protease‐Sensitive Prionopathy: Two New Cases With Motor Neuron‐Dementia Syndrome

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT We describe two patients with variably protease‐sensitive prionopathy (VPSPr) who developed progressive upper motor neuron symptoms, insomnia, behavioral and cognitive decline, compatible with primary lateral sclerosis associated with frontotemporal dementia (FTD).
María Elena Erro   +10 more
wiley   +1 more source

Whole‐Body Pattern of Muscle Degeneration and Progression in Sarcoglycanopathies

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterize whole‐body intramuscular fat distribution pattern in patients with sarcoglycanopathies and explore correlations with disease severity, duration and age at onset. Methods Retrospective, cross‐sectional, multicentric study enrolling patients with variants in one of the four sarcoglycan genes who underwent whole‐body ...
Laura Costa‐Comellas   +39 more
wiley   +1 more source

Diagnostic Utility of the ATG9A Ratio in AP‐4–Associated Hereditary Spastic Paraplegia

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Adaptor protein complex 4–associated hereditary spastic paraplegia (AP‐4‐HSP), a childhood‐onset neurogenetic disorder and frequent mimic of cerebral palsy, is caused by biallelic variants in the adaptor protein complex 4 (AP‐4) subunit genes (AP4B1 [for SPG47], AP4M1 [for SPG50], AP4E1 [for SPG51], and AP4S1 [for SPG52]).
Habibah A. P. Agianda   +12 more
wiley   +1 more source

Social Engineering Threat Analysis Using Large-Scale Synthetic Data

open access: yesJournal of Informatics and Web Engineering
We frequently hear news about compromised systems, virus attacks, spam emails, stolen bank account numbers, and loss of money. Safeguarding and protecting digital assets against these and other cyber-attacks are extremely important in our digital ...
Sellappan Palaniappan   +3 more
doaj   +1 more source

Integrating E-Commerce and Social Engineering Perspectives on Trust in Online Communication [PDF]

open access: yes, 2012
Currently, interpersonal trust in computer-mediated communication is a research topic for e-commerce as well as usable security researchers. While the e-commerce researchers focus on gaining warranted trust, usable security researchers focus on ...
Bruder, Ralph   +2 more
core  

Impact of Asymptomatic Intracranial Hemorrhage on Outcome After Endovascular Stroke Treatment

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Endovascular treatment (EVT) achieves high rates of recanalization in acute large‐vessel occlusion (LVO) stroke, but functional recovery remains heterogeneous. While symptomatic intracranial hemorrhage (sICH) has been well studied, the prognostic impact of asymptomatic intracranial hemorrhage (aICH) after EVT is less certain ...
Shihai Yang   +22 more
wiley   +1 more source

Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach

open access: yesIEEE Access, 2019
In the field of information security, there are several areas of study that are under development. Social engineering is one of them that addresses the multidisciplinary challenges of cyber security.
Patricio Zambrano   +6 more
doaj   +1 more source

Neuroinflammation in GAD65 Antibody‐Associated Epilepsy Measured Using [18F]DPA‐714 PET/MRI

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT The timing for initiating immunotherapy in patients with glutamic acid decarboxylase 65 (GAD65) antibody‐associated epilepsy is a challenge. We used the translocator protein radioligand [18F]DPA‐714 and PET to evaluate brain microglial activation.
Jingjing Chen   +10 more
wiley   +1 more source

Social Influence on the User in Social Network: Types of Communications in Assessment of the Behavioral Risks connected with the Socio-engineering Attacks

open access: yesУправленческое консультирование, 2019
The purpose of this study is to study the impact of possible types of relationships between users, which are represented in the social network “VKontakte”, on the probability of the spread of a social engineering attack.Methods.
Anastasiia O. Khlobystova   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy