Results 71 to 80 of about 226,022 (290)
dUTPases are involved in balancing the appropriate nucleotide pools. We showed that dUTPase is essential for normal development in zebrafish. The different zebrafish genomes contain several single‐nucleotide variations (SNPs) of the dut gene. One of the dUTPase variants displayed drastically lower protein stability and catalytic efficiency as compared ...
Viktória Perey‐Simon +6 more
wiley +1 more source
Modelling Socio-Technical Aspects of Organisational Security [PDF]
Identification of threats to organisations and risk assessment often take into consideration the pure technical aspects, overlooking the vulnerabilities originating from attacks on a social level, for example social engineering, and abstracting away the ...
Ivanova, Marieta Georgieva
core +3 more sources
Dapagliflozin prevents methylglyoxal‐induced retinal cell death in ARPE‐19 cells
Diabetic macular oedema is a diabetes complication of the eye, which may lead to permanent blindness. ARPE‐19 are human retinal cells used to study retinal diseases and potential therapeutics. Methylglyoxal is a compound increased in uncontrolled diabetes due to elevated blood glucose.
Naina Trivedi +7 more
wiley +1 more source
Security challenges and solutions for e-business [PDF]
The advantages of economic growth and increasing ease of operation afforded by e-business and e-commerce developments are unfortunately matched by growth in cyber attacks.
Bulajoul, W +4 more
core
Social Engineering Attacks in Cybersecurity
Abstract: In recent years, social engineering has become one of the most insidious forms of cyber attack, exploiting human vulnerabilities rather than technical flaws. This paper aims to dissect the landscape of social engineering attacks, especially in the context of recent developments during 2024 and 2025.
Dr. S. Gomathi Alias Rohini +2 more
openaire +1 more source
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks [PDF]
AbstractThe aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy‐four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed.
Bullée, Jan Willem Hendrik (author) +4 more
openaire +4 more sources
The inhibition of mitochondrial dihydroorotate dehydrogenase (DHODH) impairs syncytialization and induces cellular senescence via mitochondrial and endoplasmic reticulum stress in human trophoblast stem cells, elevating sFlt1/PlGF levels, a hallmark of placental dysfunction in hypertensive disorders of pregnancy.
Kanoko Yoshida +6 more
wiley +1 more source
Social engineering awareness game (SEAG): an empirical evaluation of using game towards improving information security awareness [PDF]
The sharp rise of social engineering attacks in recent years poses serious threats to technology consumers.This is due to the degree of damage that can be done through social engineering.
Olanrewaju, Abdus-Samad Temitope +1 more
core
Enzymes of the 2‐hydroxyacyl‐CoA lyase group catalyze the condensation of formyl‐CoA with aldehydes or ketones. Thus, by structural adaptation of active sites, practically any pharmaceutically and industrially important 2‐hydroxyacid could be biotechnologically synthesized. Combining crystal structure analysis, active site mutations and kinetic assays,
Michael Zahn +4 more
wiley +1 more source
Social Engineering Analysis Framework: A Comprehensive Playbook for Human Hacking
Social Engineering attacks are among the most exploited methods in today’s cybersecurity threat landscape. Despite the impact and the volume of such incidents, there is still a surprising lack of comprehensive tools or frameworks offering an in ...
Wojciech Nowakowski
doaj +1 more source

