Results 41 to 50 of about 5,764,266 (332)
With the rapid evolution of Android malware variants, traditional detection methods exhibit significant limitations in addressing complex patterns and adversarial attacks.
Jian Wang +4 more
doaj +1 more source
Enabling security checking of automotive ECUs with formal CSP models [PDF]
This paper presents an approach, using the process-algebra CSP, that aims to support systematic security testing of ECU components. An example use case regarding Over-The-Air software updates demonstrates the potential of our approach.
Bryans, Jeremy +4 more
core +1 more source
Quantum classical hybrid convolutional neural networks for breast cancer diagnosis
The World Health Organization states that early diagnosis is essential to increasing the cure rate for breast cancer, which poses a danger to women’s health worldwide.
Qiuyu Xiang +8 more
doaj +1 more source
xVDB: A High-Coverage Approach for Constructing a Vulnerability Database
Security patches play an important role in detecting and fixing one-day vulnerabilities. However, collecting abundant security patches from diverse data sources is not a simple task. This is because (1) each data source provides vulnerability information
Hyunji Hong +4 more
doaj +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
This study presents a comprehensive and user-centric quality model for gaming as a service (GaaS), grounded in a multistage survey methodology involving pretest, postgame, and posttest evaluations.
Ameen Shaheen +3 more
doaj +1 more source
Secure Software Developing Recommendations
Adverse effects on information in the functioning computer systems of various purpose is carried out in order to violate their confidentiality, integrity and accessibility. These threats arise from software vulnerabilities and result in unauthorized access to data or leakage of sensitive information To solve this problem, firstly, an analysis of the ...
Viktoria Grechko +2 more
openaire +2 more sources
The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities [PDF]
In spite of the growing importance of software security and the industry demand for more cyber security expertise in the workforce, the effect of security education and experience on the ability to assess complex software security problems has only been ...
Allodi, Luca +3 more
core +2 more sources
Increased security through open source [PDF]
In this paper we discuss the impact of open source on both the security and transparency of a software system. We focus on the more technical aspects of this issue, combining and extending arguments developed over the years. We stress that our discussion
Anderson R. +3 more
core +6 more sources
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande +11 more
wiley +1 more source

