Results 31 to 40 of about 1,328,609 (285)
Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles +4 more
wiley +1 more source
This study presents a comprehensive and user-centric quality model for gaming as a service (GaaS), grounded in a multistage survey methodology involving pretest, postgame, and posttest evaluations.
Ameen Shaheen +3 more
doaj +1 more source
xVDB: A High-Coverage Approach for Constructing a Vulnerability Database
Security patches play an important role in detecting and fixing one-day vulnerabilities. However, collecting abundant security patches from diverse data sources is not a simple task. This is because (1) each data source provides vulnerability information
Hyunji Hong +4 more
doaj +1 more source
Algorithmic Diversity for Software Security [PDF]
Software diversity protects against a modern-day exploits such as code-reuse attacks. When an attacker designs a code-reuse attack on an example executable, it relies on replicating the target environment.
Stewart, Michael
core
Case Study On Social Engineering Techniques for Persuasion [PDF]
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin +2 more
core +3 more sources
Defining Roles in Pediatric Palliative Care: Perspectives From Oncology and Palliative Care Teams
ABSTRACT Background Early integration of pediatric palliative care (PPC) is associated with improved symptom management, quality of life, and healthcare utilization for children with cancer. Despite this, variation persists in how PPC is understood, operationalized, and integrated within pediatric oncology programs. In particular, ambiguity surrounding
Leeat Granek +13 more
wiley +1 more source
Beyond prompting: the role of phrasing tasks in vulnerability prediction for Java
Predicting vulnerability in a code element, such as a function or method, often leverages machine or deep learning models to classify whether it is vulnerable or not.
Torge Hinrichs +2 more
doaj +1 more source
With the development of the IoT, Wireless Rechargeable Sensor Networks (WRSNs) derive more and more application scenarios with diverse performance requirements.
Songjiang Huang +4 more
doaj +1 more source
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
OS kernel is the core part of the operating system, and it plays an important role for OS resource management. A popular way to compromise OS kernel is through a kernel rootkit (i.e., malicious kernel module).
Donghai Tian +3 more
doaj +1 more source
Persistent issues in encryption software: A heuristic and cognitive walkthrough [PDF]
The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security.
El-Abed, Jad, Szewczyk, Patryk S
core +1 more source

