Results 41 to 50 of about 160,167 (287)

Cyber–Physical–Social Security of High-DER-Penetrated Smart Grids: Threats, Countermeasures, and Challenges

open access: yesIET Information Security
With the trend of large-scale renewable distributed energy sources (DERs) penetrating into the smart grids (SGs), the SGs entail heavy reliance on information and communication technologies (ICT) and increasing impact of social behaviors on system ...
Qiuyu Lu, Jun’e Li, Zhao Peng, Ming Ni
doaj   +1 more source

Fourteen Limit Cycles in a Seven-Degree Nilpotent System

open access: yesAbstract and Applied Analysis, 2013
Center conditions and the bifurcation of limit cycles for a seven-degree polynomial differential system in which the origin is a nilpotent critical point are studied. Using the computer algebra system Mathematica, the first 14 quasi-Lyapunov constants of
Wentao Huang, Ting Chen, Tianlong Gu
doaj   +1 more source

Trusted CI Experiences in Cybersecurity and Service to Open Science

open access: yes, 2019
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew   +18 more
core   +1 more source

Treatment Decision‐Making Roles and Preferences Among Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Decision‐making (DM) dynamics between adolescents and young adults (AYAs) with cancer, parents, and oncologists remain underexplored in diverse populations. We examined cancer treatment DM preferences among an ethnically and socioeconomically diverse group of AYAs and their parents.
Amanda M. Gutierrez   +14 more
wiley   +1 more source

TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions

open access: yesCybersecurity
With the continuous advancement of virtualization technology and the widespread adoption of 5G networks, the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent.
Jie Yuan   +4 more
doaj   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Cell wall target fragment discovery using a low‐cost, minimal fragment library

open access: yesFEBS Letters, EarlyView.
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan   +5 more
wiley   +1 more source

IEEE Access Special Section Editorial: Trusted Computing

open access: yesIEEE Access, 2020
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan   +3 more
doaj   +1 more source

Open-TEE - An Open Virtual Trusted Execution Environment

open access: yes, 2015
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet their use has been limited primarily to applications developed by the device vendors. Recent standardization of TEE interfaces by GlobalPlatform (GP) promises
Asokan, N.   +3 more
core   +1 more source

Improve cloud computing security using RSA encryption with Fermat's little theorem [PDF]

open access: yes, 2014
Cloud computing (CC) is new technology for hosting and delivering services over the Internet. It moves computing and data away from desktop and portable PCs into large data centers.CC is a Internet based computing, the entire data reside over a set of ...
Mohamed Shereek, Balkees   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy