Results 31 to 40 of about 184,016 (328)

A method to assess demand growth vulnerability of travel times on road network links

open access: yes, 2012
Many national governments around the world have turned their recent focus to monitoring the actual reliability of their road networks. In parallel there have been major research efforts aimed at developing modelling approaches for predicting the ...
Balijepalli   +17 more
core   +1 more source

Computational inference of cancer-specific vulnerabilities in clinical samples [PDF]

open access: yesGenome Biology, 2020
Abstract Background Systematic in vitro loss-of-function screens provide valuable resources that can facilitate the discovery of drugs targeting cancer vulnerabilities. Results We develop a deep learning-based method to predict tumor-specific vulnerabilities in patient samples by leveraging a wealth of in vitro screening data. Acquired dependencies of
Jong Won Lee   +10 more
openaire   +4 more sources

Identifying Cloud Computing Vulnerabilities

open access: yesInternational Journal of Scientific Research in Science, Engineering and Technology, 2014
Cloud computing is passing through development stage and with the passage process of development, cloud is also posing with security threats, challenges and risks. Lots of security threats, risks and challenges are directly or indirectly due to vulnerabilities in cloud environment.
openaire   +2 more sources

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

open access: yesIEEE Access, 2020
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT).
Pooja Anand   +5 more
doaj   +1 more source

OS diversity for intrusion tolerance: Myth or reality? [PDF]

open access: yes, 2011
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity.
Bessani, A. N.   +4 more
core   +2 more sources

Network topology drives population temporal variability in experimental habitat networks

open access: yesPopulation Ecology, EarlyView.
Habitat patches connected by dispersal pathways form habitat networks. We explored how network topology affects population outcomes in laboratory experiments using a model species (Daphnia carinata). Central habitat nodes in complex lattice networks exhibited lower temporal variability in population sizes, suggesting they support more stable ...
Yiwen Xu   +3 more
wiley   +1 more source

On Proof-of-Accuracy Consensus Protocols

open access: yesMathematics, 2022
Consensus protocols are a fundamental part of any blockchain; although several protocols have been in operation for several years, they still have drawbacks.
Fredy Andres Aponte-Novoa   +1 more
doaj   +1 more source

Cyclic Bayesian Attack Graphs: A Systematic Computational Approach

open access: yes, 2020
Attack graphs are commonly used to analyse the security of medium-sized to large networks. Based on a scan of the network and likelihood information of vulnerabilities, attack graphs can be transformed into Bayesian Attack Graphs (BAGs).
Mace, John   +3 more
core   +1 more source

Social context prevents heat hormetic effects against mutagens during fish development

open access: yesFEBS Letters, EarlyView.
This study shows that sublethal heat stress protects fish embryos against ultraviolet radiation, a concept known as ‘hormesis’. However, chemical stress transmission between fish embryos negates this protective effect. By providing evidence for the mechanistic molecular basis of heat stress hormesis and interindividual stress communication, this study ...
Lauric Feugere   +5 more
wiley   +1 more source

VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms

open access: yesTongxin xuebao, 2015
Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving
UZhi-jun W, UIYi C, UEMeng Y
doaj   +2 more sources

Home - About - Disclaimer - Privacy