Results 11 to 20 of about 193,653 (266)
The class imbalance problem negatively impacts learning algorithms’ performance in minority classes which may constitute more severe attacks than the majority ones.
Seyed Mohammad Hadi Mirsadeghi +3 more
doaj +1 more source
Nowadays every provider of critical infrastructure is obliged to use alarm systems - mainly simple surveillance CCTV cameras - to increase security and safety of those objects.
Zuzana Kurillova +2 more
doaj +1 more source
An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data
Traditional searchable encryption schemes adopting the bag-of-words model occupy massive space to store the document set's index, where the dimension of the document vector is equal to the scale of the dictionary.
Xuelong Dai +4 more
doaj +1 more source
An Adaptive Ensemble Machine Learning Model for Intrusion Detection
In recent years, advanced threat attacks are increasing, but the traditional network intrusion detection system based on feature filtering has some drawbacks which make it difficult to find new attacks in time.
Xianwei Gao +4 more
doaj +1 more source
Medical Device Safety Management Using Cybersecurity Risk Analysis
Hospital biomedical engineering teams are responsible for establishing and regulating medical equipment management programs (MEMPs); these programs ensure the safety and reliability of medical devices.
Dong-Won Kim +2 more
doaj +1 more source
Tunable band-structures of MSe2/C3N (M = Mo and W) van der Waals Heterojunctions
Van der Waals (vdW) heterojunctions constructed using two-dimensional (2D) materials have shown excellent properties for applications in various fields. In this study, the structural and electronic properties of 2D MoSe _2 /C _3 N and WSe _2 /C _3 N vdW ...
Zixiang Liu +4 more
doaj +1 more source
With the rapid evolution of Android malware variants, traditional detection methods exhibit significant limitations in addressing complex patterns and adversarial attacks.
Jian Wang +4 more
doaj +1 more source
xVDB: A High-Coverage Approach for Constructing a Vulnerability Database
Security patches play an important role in detecting and fixing one-day vulnerabilities. However, collecting abundant security patches from diverse data sources is not a simple task. This is because (1) each data source provides vulnerability information
Hyunji Hong +4 more
doaj +1 more source
Quantum classical hybrid convolutional neural networks for breast cancer diagnosis
The World Health Organization states that early diagnosis is essential to increasing the cure rate for breast cancer, which poses a danger to women’s health worldwide.
Qiuyu Xiang +8 more
doaj +1 more source
E2A selectively regulates TGF‐β–induced apoptosis in KRAS‐mutant non‐small cell lung cancer
Ability to induce apoptosis by TGF‐β is frequently lost in advanced lung adenocarcinoma despite intact TGF‐β signaling. We identify E2A as a mutant KRAS–dependent mediator of resistance to TGF‐β–induced apoptosis. TGF‐β induces E2A via SMAD3 in mutant KRAS cells, and E2A silencing restores apoptosis and enhances radiation response in cell lines ...
Sergei Chuikov +3 more
wiley +1 more source

