Results 31 to 40 of about 38,506 (280)

A Security Monitoring Framework For Virtualization Based HEP Infrastructures

open access: yes, 2017
High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system ...
A. Gomez Ramirez   +6 more
core   +1 more source

Research and development of virtualization in Wireless sensor networks

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Virtualization is foundational for applying both cloud computing and big data. It provides the basis for many platform attributes required to access, store, analyze, and manage the distributed computing components in big data environments. Virtualization
M. Sandeep Kumar, Prabhu. J
doaj   +1 more source

SVLAN: Secure & Scalable Network Virtualization

open access: yesProceedings 2020 Network and Distributed System Security Symposium, 2020
Proceedings 2020 Network and Distributed System Security Symposium (NDSS 2020)
Kwon, Jonghoon   +3 more
openaire   +2 more sources

Virtual World Security Inspection [PDF]

open access: yesJournal of Networks, 2012
Virtual property theft is a serious problem that exists in virtual worlds. Legitimate users of these worlds invest considerable amounts of time, effort and real-world money into obtaining virtual property, but unfortunately, are becoming victims of theft in high numbers.
Nicholas Charles Patterson   +1 more
openaire   +1 more source

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Safety assessment of virtualization computing platform for avionics system of civil aircraft

open access: yesXibei Gongye Daxue Xuebao
Aiming at the main problems that affect the security of airborne computing platform after virtualization, such as time-space isolation, fault isolation and schedulability, this paper studies the security level evaluation of airborne computing platform ...
YANG Huan   +4 more
doaj   +1 more source

An isoform of 14‐3‐3 protein regulates transbilayer lipid movement at the plasma membrane

open access: yesFEBS Letters, EarlyView.
Loss of 14‐3‐3ζ in CHO cells confers resistance to exogenous phosphatidylserine (PS) and impairs endocytosis‐independent inward flip‐flop of fluorescent PS at the plasma membrane. RNAi‐mediated knockdown reproduces this defect, while no additive effect is seen in ATP11C‐deficient cells.
Akiko Yamaji‐Hasegawa   +3 more
wiley   +1 more source

CyExec*: A High-Performance Container-Based Cyber Range With Scenario Randomization

open access: yesIEEE Access, 2021
With increasing threats to information security, information security education through practical exercises specifically cyber range has attracted attention.
Ryotaro Nakata, Akira Otsuka
doaj   +1 more source

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Home - About - Disclaimer - Privacy