Results 81 to 90 of about 1,328,609 (285)

The Federal Information Security Management Act of 2002: A Potemkin Village [PDF]

open access: yes, 2011
Due to the daunting possibilities of cyberwarfare, and the ease with which cyberattacks may be conducted, the United Nations has warned that the next world war could be initiated through worldwide cyberattacks between countries.
White, Daniel M.
core   +1 more source

Effects of Causal Beliefs About Gout on Public Views About Gout Management: A Randomized Experimental Study

open access: yesArthritis Care &Research, EarlyView.
Objective Despite well‐described biologic causes, the public views unhealthy lifestyle choices as the primary cause of gout. This study investigated how causal beliefs about gout influence the public's views about its management. Methods In a randomized study, 201 members of the public viewed one of two 2‐minute videos about gout.
Rachel Murdoch   +6 more
wiley   +1 more source

Security Aspects of Zones and Conduits in IEC 62443

open access: yesJournal of Cybersecurity and Privacy
The IEC 62443 standard defines that, based on risk assessment, different parts of an Industrial Automation and Control System (IACS) may have different security levels, and that parts with the same security level can be designated as separate zones ...
Martin Gilje Jaatun   +6 more
doaj   +1 more source

NeuFuzz: Efficient Fuzzing With Deep Neural Network

open access: yesIEEE Access, 2019
Coverage-guided graybox fuzzing is one of the most popular and effective techniques for discovering vulnerabilities due to its nature of high speed and scalability.
Yunchao Wang   +3 more
doaj   +1 more source

Associations of Rheumatoid Arthritis Disease Activity With Frailty Over Five Years of Follow‐up

open access: yesArthritis Care &Research, EarlyView.
Objective To evaluate whether rheumatoid arthritis (RA) disease activity is associated with frailty both in cross‐section and longitudinally. Methods Participants within the Veterans Affairs Rheumatoid Arthritis (VARA) registry enrolled from 2003 to 2022 were included.
Courtney N. Loecker   +14 more
wiley   +1 more source

Real‐World Trends in Prenatal Antirheumatic Drug Utilization in Ontario, Canada: A Cross‐Sectional Time‐Series Analysis

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to describe real‐world trends in preconception and prenatal use of antirheumatic drugs among pregnant individuals with rheumatic diseases in Ontario, Canada. Methods We conducted a time‐series analysis using repeated cross‐sectional data to examine annual patterns of disease‐modifying antirheumatic drug (DMARD) use among ...
Shenthuraan Tharmarajah   +6 more
wiley   +1 more source

Design and Implementation of SFCI: A Tool for Security Focused Continuous Integration

open access: yesComputers, 2019
Software security is a component of software development that should be integrated throughout its entire development lifecycle, and not simply as an afterthought.
Michael Lescisin   +2 more
doaj   +1 more source

Semantics for Secure Software

open access: yes, 2019
Supplemental file(s) description: Coq Code for FOCAL, Coq code for FLAFOL ; In order to build machine-checked proven-secure software, we need formal se curity policies that express what it means to be “secure.” We must then show that the semantics of our software matches the semantics of those policies.
openaire   +2 more sources

Thermodynamic Pathways of Nonequilibrium Solidification in Wire‐Arc Additive Manufacturing Fe‐Based Multicomponent Alloy Structures

open access: yesAdvanced Engineering Materials, EarlyView.
Geometry‐driven thermal behavior in wire‐arc additive manufacturing (WAAM) influences microstructural evolution during nonequilibrium solidification of a chemically complex Fe–Cr–Nb–W–Mo–C nanocomposite system. By comparing different deposits configurations, distinct entropy–cooling rate correlations, segregation, and carbide evolution are revealed ...
Blanca Palacios   +5 more
wiley   +1 more source

An Empirical Study on Security Knowledge Sharing and Learning in Open Source Software Communities

open access: yesComputers, 2018
Open source software (OSS) security has been the focus of the security community and practitioners over the past decades. However, the number of new vulnerabilities keeps increasing in today’s OSS systems.
Shao-Fang Wen
doaj   +1 more source

Home - About - Disclaimer - Privacy