Results 31 to 40 of about 184,016 (328)
A method to assess demand growth vulnerability of travel times on road network links
Many national governments around the world have turned their recent focus to monitoring the actual reliability of their road networks. In parallel there have been major research efforts aimed at developing modelling approaches for predicting the ...
Balijepalli+17 more
core +1 more source
Computational inference of cancer-specific vulnerabilities in clinical samples [PDF]
Abstract Background Systematic in vitro loss-of-function screens provide valuable resources that can facilitate the discovery of drugs targeting cancer vulnerabilities. Results We develop a deep learning-based method to predict tumor-specific vulnerabilities in patient samples by leveraging a wealth of in vitro screening data. Acquired dependencies of
Jong Won Lee+10 more
openaire +4 more sources
Identifying Cloud Computing Vulnerabilities
Cloud computing is passing through development stage and with the passage process of development, cloud is also posing with security threats, challenges and risks. Lots of security threats, risks and challenges are directly or indirectly due to vulnerabilities in cloud environment.
openaire +2 more sources
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT).
Pooja Anand+5 more
doaj +1 more source
OS diversity for intrusion tolerance: Myth or reality? [PDF]
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity.
Bessani, A. N.+4 more
core +2 more sources
Network topology drives population temporal variability in experimental habitat networks
Habitat patches connected by dispersal pathways form habitat networks. We explored how network topology affects population outcomes in laboratory experiments using a model species (Daphnia carinata). Central habitat nodes in complex lattice networks exhibited lower temporal variability in population sizes, suggesting they support more stable ...
Yiwen Xu+3 more
wiley +1 more source
On Proof-of-Accuracy Consensus Protocols
Consensus protocols are a fundamental part of any blockchain; although several protocols have been in operation for several years, they still have drawbacks.
Fredy Andres Aponte-Novoa+1 more
doaj +1 more source
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Attack graphs are commonly used to analyse the security of medium-sized to large networks. Based on a scan of the network and likelihood information of vulnerabilities, attack graphs can be transformed into Bayesian Attack Graphs (BAGs).
Mace, John+3 more
core +1 more source
Social context prevents heat hormetic effects against mutagens during fish development
This study shows that sublethal heat stress protects fish embryos against ultraviolet radiation, a concept known as ‘hormesis’. However, chemical stress transmission between fish embryos negates this protective effect. By providing evidence for the mechanistic molecular basis of heat stress hormesis and interindividual stress communication, this study ...
Lauric Feugere+5 more
wiley +1 more source
VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms
Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving
UZhi-jun W, UIYi C, UEMeng Y
doaj +2 more sources