Results 141 to 150 of about 557,385 (336)
Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection [PDF]
Mohanad Sarhan +3 more
openalex +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
Modeling Cyber Threat Intelligence
Siri Bromander +4 more
openaire +1 more source
Australia's Migration Strategy: An Effective Response to Migrant Worker Exploitation?
ABSTRACT A series of publicised migrant worker injuries and deaths has drawn attention to the issue of migrant worker exploitation (MWE) in Australia. In response, the Australian Government has included ‘Tackling Worker Exploitation’ as a key area of its Migration Strategy which it introduced in 2023. However, it is unclear how effective the Strategy’s
Evelyn Dowling, Alexandra Ridgway
wiley +1 more source
Sex as a biological variable (SABV) is a critical determinant of pharmacokinetics, pharmacodynamics, and toxicity in nonclinical studies. This review highlights how inappropriate neglect of sex differences compromises animal welfare, scientific reproducibility, and regulatory compliance.
Kenta Onuma +2 more
wiley +1 more source
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time
Ryusei Nagasawa +7 more
openalex +2 more sources
Porcine kidney xenotransplantation: From primate models to clinical reality
In the face of a critical shortage of human donor kidneys for end‐stage renal disease patients, porcine kidney xenotransplantation has emerged as a viable solution. This field has navigated major hurdles, including immune rejection, physiological incompatibilities, potential biomechanical differences and the risk of cross‐species infection. To overcome
Zihang Guo +3 more
wiley +1 more source
The threat intelligence platform is a security system that collects malicious feeds from different sources using help of a tool called intelMQ, the threat intelligence platform provides a solution for IT security networks through collecting and processing security feeds and stores the results in mango database.
NICHOLAS MASETE +5 more
openaire +1 more source
Cancer therapy‐induced ototoxicity: Current challenges and emerging management strategies
This review comprehensively examines the key risk factors for cancer therapy‐induced ototoxicity, including cumulative drug dose, genetic susceptibility, and combined treatment regimens. It highlights current challenges in ototoxicity monitoring, such as insufficient timeliness and limited clinical adoption, and advocates for standardized auditory ...
Yuqi Huang +4 more
wiley +1 more source

