Results 21 to 30 of about 193,653 (266)
This study presents a comprehensive and user-centric quality model for gaming as a service (GaaS), grounded in a multistage survey methodology involving pretest, postgame, and posttest evaluations.
Ameen Shaheen +3 more
doaj +1 more source
Secure Software Developing Recommendations
Adverse effects on information in the functioning computer systems of various purpose is carried out in order to violate their confidentiality, integrity and accessibility. These threats arise from software vulnerabilities and result in unauthorized access to data or leakage of sensitive information To solve this problem, firstly, an analysis of the ...
Viktoria Grechko +2 more
openaire +2 more sources
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
Beyond prompting: the role of phrasing tasks in vulnerability prediction for Java
Predicting vulnerability in a code element, such as a function or method, often leverages machine or deep learning models to classify whether it is vulnerable or not.
Torge Hinrichs +2 more
doaj +1 more source
With the development of the IoT, Wireless Rechargeable Sensor Networks (WRSNs) derive more and more application scenarios with diverse performance requirements.
Songjiang Huang +4 more
doaj +1 more source
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
OS kernel is the core part of the operating system, and it plays an important role for OS resource management. A popular way to compromise OS kernel is through a kernel rootkit (i.e., malicious kernel module).
Donghai Tian +3 more
doaj +1 more source
Exploratory Analysis of ELP1 Expression in Whole Blood From Patients With Familial Dysautonomia
ABSTRACT Background Familial dysautonomia (FD) is a hereditary neurodevelopmental disorder caused by aberrant splicing of the ELP1 gene, leading to a tissue‐specific reduction in ELP1 protein expression. Preclinical models indicate that increasing ELP1 levels can mitigate disease manifestations.
Alejandra González‐Duarte +13 more
wiley +1 more source
A Systematic Literature Review of Cyber Security Monitoring in Maritime
In recent years, many cyber incidents have occurred in the maritime sector, targeting the information technology (IT) and operational technology (OT) infrastructure.
Risto Vaarandi +4 more
doaj +1 more source
End-to-End Database Software Security
End-to-end security is essential for relational database software. Most database management software provide data protection at the server side and in transit, but data are no longer protected once they arrive at the client software.
Denis Ulybyshev +3 more
doaj +1 more source
Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung +190 more
wiley +1 more source

