Results 51 to 60 of about 306,057 (287)

Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication

open access: yesApplied Sciences, 2020
Due to the emergence of online society, a representative user authentication method that is password authentication has been a key topic. However, in this authentication method, various attack techniques have emerged to steal passwords input from the ...
Kyungroul Lee, Kangbin Yim
doaj   +1 more source

Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system

open access: yesFEBS Letters, EarlyView.
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley   +1 more source

Development Of A Gis Based Peat Swamp Forest Fire Hazard Model [PDF]

open access: yes, 2007
A GIS-Based peat swamp forest fire hazard model that integrated AHP process and GIS analysis was developed. A GIS-grid based fire vulnerability map was thus produced for Pekan, Pahang.
Setiawan, Iwan
core  

DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation [PDF]

open access: yes, 2018
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable ...
De Donno, Michele   +3 more
core   +4 more sources

Linking neurogenesis, oligodendrogenesis, and myelination defects to neurodevelopmental disruption in primary mitochondrial disorders

open access: yesFEBS Letters, EarlyView.
Mitochondrial remodeling shapes neural and glial lineage progression by matching metabolic supply with demand. Elevated OXPHOS supports differentiation and myelin formation, while myelin compaction lowers mitochondrial dependence, revealing mitochondria as key drivers of developmental energy adaptation.
Sahitya Ranjan Biswas   +3 more
wiley   +1 more source

Vulnerability Assessment of Starlink User Terminals: Firmware and gRPC Communication Analysis

open access: yesIEEE Access
Modern society relies on communication networks; however, geographic constraints and infrastructure disparities perpetuate the global digital divide. Low Earth orbit (LEO) satellite communication has emerged as a promising solution.
Seoyul Kim, Seunghun Han
doaj   +1 more source

Developing a global risk engine [PDF]

open access: yes, 2010
Risk analysis is a critical link in the reduction of casualties and damages due to earthquakes. Recognition of this relation has led to a rapid rise in demand for accurate, reliable and flexible risk assessment software.
Crowley, H.   +3 more
core   +1 more source

Dual targeting of RET and SRC synergizes in RET fusion‐positive cancer cells

open access: yesMolecular Oncology, EarlyView.
Despite the strong activity of selective RET tyrosine kinase inhibitors (TKIs), resistance of RET fusion‐positive (RET+) lung cancer and thyroid cancer frequently occurs and is mainly driven by RET‐independent bypass mechanisms. Son et al. show that SRC TKIs significantly inhibit PAK and AKT survival signaling and enhance the efficacy of RET TKIs in ...
Juhyeon Son   +13 more
wiley   +1 more source

Cooperative-Intelligent Transport Systems for Vulnerable Road Users Safety [PDF]

open access: yes2019 7th International Conference on Future Internet of Things and Cloud (FiCloud), 2019
Grant numbers : 5GB-CAR - 5G Connected Car.
Casademont Serra, Jordi   +5 more
openaire   +2 more sources

The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities [PDF]

open access: yes, 2018
In spite of the growing importance of software security and the industry demand for more cyber security expertise in the workforce, the effect of security education and experience on the ability to assess complex software security problems has only been ...
Allodi, Luca   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy