Results 81 to 90 of about 104,626 (245)
Artificial intelligence tools for automating penetration testing
The article discusses automated penetration testing using artificial intelligence (AI), which significantly enhances the efficiency and accuracy of cybersecurity assessments.
M.S. Koloshchuk +3 more
doaj +1 more source
ABSTRACT As global populations age, cancer is increasingly becoming a leading cause of morbidity and mortality among older adults, particularly in low‐ and middle‐income countries (LMICs). Despite accounting for the majority of new cancer cases and deaths, older individuals remain underrepresented in cancer research, clinical guidelines, and health ...
Ibrahim Bidemi Abdullateef +2 more
wiley +1 more source
Ontological model for predicting cyberattacks based on virtualized Honeynets
The honeynets security tools are widely used today for the purpose of gathering information from potential attackers about vulnerabilities in our network. For performing correct use of them is necessary to understand the existing types, structures raised,
Gaona-García, Pablo +2 more
doaj +1 more source
Frailty Exacerbates Disability in Progressive Multiple Sclerosis
ABSTRACT Background To evaluate frailty in severe progressive multiple sclerosis (PMS) and to investigate the underlying mechanisms. Methods This prospective, cross‐sectional, multicenter study enrolled a late severe PMS group requiring skilled nursing (n = 53) and an age, sex, and disease duration‐matched control PMS group (n = 53).
Taylor R. Wicks +10 more
wiley +1 more source
Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung +190 more
wiley +1 more source
A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models
In recent years, the use of deep learning models for deploying sentiment analysis systems has become a widespread topic due to their processing capacity and superior results on large volumes of information.
Monserrat Vázquez-Hernández +5 more
doaj +1 more source
Reduced Muscular Carnosine in Proximal Myotonic Myopathy—A Pilot 1H‐MRS Study
ABSTRACT Objective Myotonic dystrophy type 2 (proximal myotonic myopathy, PROMM) is a progressive multisystem disorder with muscular symptoms (proximal weakness, pain, myotonia) and systemic manifestations such as diabetes mellitus, cataracts, and cardiac arrhythmias.
Alexander Gussew +11 more
wiley +1 more source
Face Detection Performance Using CNNs and Bug Bonuty Program (BBP)
Bug bounty schemes make use of outside ethical hackers to find and fix a variety of security flaws, guaranteeing quicker and more affordable problem solving. Better confidence in and image of the company in the cybersecurity space, faster solving issues,
Yasmin Makki Mohialden +2 more
doaj +1 more source
Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz +3 more
wiley +1 more source
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source

