Results 31 to 40 of about 1,328,609 (285)

Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles   +4 more
wiley   +1 more source

Developing a User-Centric Quality Model for Gaming as a Service (GaaS): Enhancing User Satisfaction Through Key Quality Factors

open access: yesIET Software
This study presents a comprehensive and user-centric quality model for gaming as a service (GaaS), grounded in a multistage survey methodology involving pretest, postgame, and posttest evaluations.
Ameen Shaheen   +3 more
doaj   +1 more source

xVDB: A High-Coverage Approach for Constructing a Vulnerability Database

open access: yesIEEE Access, 2022
Security patches play an important role in detecting and fixing one-day vulnerabilities. However, collecting abundant security patches from diverse data sources is not a simple task. This is because (1) each data source provides vulnerability information
Hyunji Hong   +4 more
doaj   +1 more source

Algorithmic Diversity for Software Security [PDF]

open access: yes, 2013
Software diversity protects against a modern-day exploits such as code-reuse attacks. When an attacker designs a code-reuse attack on an example executable, it relies on replicating the target environment.
Stewart, Michael
core  

Case Study On Social Engineering Techniques for Persuasion [PDF]

open access: yes, 2010
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin   +2 more
core   +3 more sources

Defining Roles in Pediatric Palliative Care: Perspectives From Oncology and Palliative Care Teams

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Early integration of pediatric palliative care (PPC) is associated with improved symptom management, quality of life, and healthcare utilization for children with cancer. Despite this, variation persists in how PPC is understood, operationalized, and integrated within pediatric oncology programs. In particular, ambiguity surrounding
Leeat Granek   +13 more
wiley   +1 more source

Beyond prompting: the role of phrasing tasks in vulnerability prediction for Java

open access: yesCybersecurity
Predicting vulnerability in a code element, such as a function or method, often leverages machine or deep learning models to classify whether it is vulnerable or not.
Torge Hinrichs   +2 more
doaj   +1 more source

Charging Scheduling Method for Wireless Rechargeable Sensor Networks Based on Energy Consumption Rate Prediction for Nodes

open access: yesSensors
With the development of the IoT, Wireless Rechargeable Sensor Networks (WRSNs) derive more and more application scenarios with diverse performance requirements.
Songjiang Huang   +4 more
doaj   +1 more source

A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning

open access: yesIEEE Access, 2019
OS kernel is the core part of the operating system, and it plays an important role for OS resource management. A popular way to compromise OS kernel is through a kernel rootkit (i.e., malicious kernel module).
Donghai Tian   +3 more
doaj   +1 more source

Persistent issues in encryption software: A heuristic and cognitive walkthrough [PDF]

open access: yes, 2014
The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security.
El-Abed, Jad, Szewczyk, Patryk S
core   +1 more source

Home - About - Disclaimer - Privacy