Results 41 to 50 of about 801,622 (296)
Introduction: The Zika virus (ZIKV) infection in pregnant women has been associated with an increased risk of birth defects. We aimed to estimate the prevalence of sensorineural hearing loss (SNHL) in infants exposed to the ZIKV during their gestation ...
Erika J Verján-Carrillo +4 more
doaj +1 more source
Social engineering: Concepts, Techniques and Security Countermeasures
The purpose of this report is to research the topic called Social Engineering in Cyber Security and present the explanation of the meaning, concepts, techniques, and security countermeasures of Social Engineering based on factual academic research.
openaire +2 more sources
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
A Serious Game for Eliciting Social Engineering Security Requirements [PDF]
Social engineering is the acquisition of informationabout computer systems by methods that deeply include non-technical means. While technical security of most critical systemsis high, the systems remain vulnerable to attacks from socialengineers. Social engineering is a technique that: (i) does notrequire any (advanced) technical tools, (ii) can be ...
Kristian Beckers, Sebastian Pape
openaire +3 more sources
The Effects Of Social Engineering On Enterprise Security
The focus of this research was to explore present control methods and solutions used throughout technology-based, healthcare-based, and manufacturing-based organizations in southwest Georgia to determine their effectiveness for reducing potential threats. Semi-structured interviews with open-ended questions are used to explore 30 information technology
openaire +1 more source
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source
Defining Social Engineering in Cybersecurity
Social engineering has posed a serious security threat to infrastructure, user, data and operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as inconsistent conceptual intensions, a vague conceptual boundary, confusing ...
Zuoguang Wang, Limin Sun, Hongsong Zhu
doaj +1 more source
The Design and Evaluation of an Interactive Social Engineering Training Programme [PDF]
Social engineering is a major issue affecting organisational security. Educating employees on how to avoid social engineering attacks is important because social engineering tries to penetrate an organisation by using employees to grant authorized ...
Alkhamis, Esra, Renaud, Karen
core
Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein +13 more
wiley +1 more source
A Survey of the Trends in Facial and Expression Recognition Databases and Methods
Automated facial identification and facial expression recognition have been topics of active research over the past few decades. Facial and expression recognition find applications in human-computer interfaces, subject tracking, real-time security ...
Emmons, Michelle, Roychowdhury, Sohini
core +1 more source

