Ontological model for predicting cyberattacks based on virtualized Honeynets
The honeynets security tools are widely used today for the purpose of gathering information from potential attackers about vulnerabilities in our network. For performing correct use of them is necessary to understand the existing types, structures raised,
Gaona-García, Pablo +2 more
doaj +1 more source
A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models
In recent years, the use of deep learning models for deploying sentiment analysis systems has become a widespread topic due to their processing capacity and superior results on large volumes of information.
Monserrat Vázquez-Hernández +5 more
doaj +1 more source
Face Detection Performance Using CNNs and Bug Bonuty Program (BBP)
Bug bounty schemes make use of outside ethical hackers to find and fix a variety of security flaws, guaranteeing quicker and more affordable problem solving. Better confidence in and image of the company in the cybersecurity space, faster solving issues,
Yasmin Makki Mohialden +2 more
doaj +1 more source
The electrophysiologic substrates of atrial flutter and fibrillation (AFF) have been studied in patients with paroxysmal arrhythmias. Atrial repetitive responses to extrastimuli are a nonspecific response, even though they can precipitate AFF. AFF inducibility is rather sensitive, but not very specific, in separating patients from controls. There is no
openaire +2 more sources
Romanian Labour Market – Vulnerable persons and vulnerabilities [PDF]
Romanian economy’s transition process began suddenly and was accompanied by disintegration of former political and economic system. In terms of GDP per capita, Romania has been one of the poorest countries in Central and Eastern Europe.
Daniela TODOSE +2 more
doaj
PASTA-4-PHT: a pipeline for automated security and technical audits for the personal health train. [PDF]
Welten S +9 more
europepmc +1 more source
Cybersecurity breaches in medical devices: analyzing FDA safety communications in response to patient security concerns. [PDF]
Menon V.
europepmc +1 more source
A qualitative study of the social and structural vulnerabilities of HIV and chronic disease syndemics in low-resource urban health facilities in South Africa. [PDF]
Bulled N +3 more
europepmc +1 more source
Author Correction: Combination of PARP and KRAS<sup>G12D</sup> inhibitors enhances therapeutic efficacy by exploiting vulnerabilities in PDAC. [PDF]
Xu X +9 more
europepmc +1 more source
Transdiagnostic Neurobiological and Nutritional Factors in Eating Disorders: Implications for Integrative Treatment Models. [PDF]
Łucka I +4 more
europepmc +1 more source

