MaSS-Droid: Android Malware Detection Framework Using Multi-Layer Feature Screening and Stacking Integration. [PDF]
Zhang Z, Han Q, Shi Z.
europepmc +1 more source
ABSTRACT Developmental psychology continues to shape how adults engage with children about death and dying. This influences whether children are included in rituals surrounding human and other‐than‐human bodies. Figurations of the innocent, immature and vulnerable child still dominate adult imaginaries of young children's understandings of mortality ...
Karin Murris +2 more
wiley +1 more source
Representation of obligate groundwater‐dwelling copepod diversity in European protected areas
Abstract Groundwaters sustain diverse surface ecosystems and are populated by metazoan species, mostly invertebrates, that provide fundamental ecological functions and are often of prominent conservation value due to narrow endemism and high phylogenetic rarity.
Francesco Cerasoli +7 more
wiley +1 more source
Hybrid deep learning model for accurate and efficient android malware detection using DBN-GRU. [PDF]
Kauser Sk H, Anu V M.
europepmc +1 more source
Block scheduling in practice: An optimal decomposition strategy for nonidentical operating rooms
Abstract We develop and implement a Master Surgery Schedule for a real‐life hospital, assigning operating room (OR) time to surgical specialties over a multi‐week horizon. Through action research, we identify a critical operational challenge: the issue of split blocks. Split blocks allow two specialties to share an OR on the same day—one in the morning,
Vincent J. J. van Ham +2 more
wiley +1 more source
An Intelligent Sensing Framework for Early Ransomware Detection Using MHSA-LSTM Machine Learning. [PDF]
Alqahtani A, Ohemeng MO, Sheldon FT.
europepmc +1 more source
This scoping review aimed to understand the construct ‘involvement’ in daily life activities from the perspective of children and young people with childhood‐onset disabilities. We identified six conceptual ideas, including a continuum of inner dedication or investment in‐the‐moment, and five others reflecting how children and young people process ...
Vera C Kaelin +4 more
wiley +1 more source
Mitigating semantic label divergence in federated learning: Obfuscated encoding and alert filtering for security monitoring. [PDF]
Lee Y, Im J, Kim J, Yoon M.
europepmc +1 more source
Asymmetric sanctions and corruption: Theory and practice in China
Abstract Asymmetric punishment of partners in crime, intended to incentivize whistle‐blowing, may increase detection and deterrence. The idea is age‐old but its use against corruption is not frequent. We study a 1997 Chinese reform that strengthened such asymmetries for some forms of bribery.
Maria Perrotta Berlin +3 more
wiley +1 more source
A Survey on Secure WiFi Sensing Technology: Attacks and Defenses. [PDF]
Liu X, Meng X, Duan H, Hu Z, Wang M.
europepmc +1 more source

