Results 51 to 60 of about 5,764,266 (332)
Beyond prompting: the role of phrasing tasks in vulnerability prediction for Java
Predicting vulnerability in a code element, such as a function or method, often leverages machine or deep learning models to classify whether it is vulnerable or not.
Torge Hinrichs +2 more
doaj +1 more source
With the development of the IoT, Wireless Rechargeable Sensor Networks (WRSNs) derive more and more application scenarios with diverse performance requirements.
Songjiang Huang +4 more
doaj +1 more source
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
OS kernel is the core part of the operating system, and it plays an important role for OS resource management. A popular way to compromise OS kernel is through a kernel rootkit (i.e., malicious kernel module).
Donghai Tian +3 more
doaj +1 more source
A proposed case for the cloud software engineering in security [PDF]
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core
An architecture for certification-aware service discovery [PDF]
Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust ...
Bezzi, M., Sabetta, A., Spanoudakis, G.
core +1 more source
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece +18 more
wiley +1 more source
A Systematic Literature Review of Cyber Security Monitoring in Maritime
In recent years, many cyber incidents have occurred in the maritime sector, targeting the information technology (IT) and operational technology (OT) infrastructure.
Risto Vaarandi +4 more
doaj +1 more source
Generation of two normal and tumour (cancerous) paired human cell lines using an established tissue culture technique and their characterisation is described. Cell lines were characterised at cellular, protein, chromosome and gene expression levels and for HPV status.
Simon Broad +12 more
wiley +1 more source
A Fuzzy Logic-Based Directional Charging Scheme for Wireless Rechargeable Sensor Networks
Wireless Power Transfer (WPT) has become a key technology to extend network lifetime in Wireless Rechargeable Sensor Networks (WRSNs). The traditional omnidirectional recharging method has a wider range of energy radiation, but it inevitably results in ...
Yuhan Ma +4 more
doaj +1 more source
End-to-End Database Software Security
End-to-end security is essential for relational database software. Most database management software provide data protection at the server side and in transit, but data are no longer protected once they arrive at the client software.
Denis Ulybyshev +3 more
doaj +1 more source

