Results 41 to 50 of about 202,881 (332)
One of the most important steps in earthquake disaster management is the prediction of probable damages which is called earthquake vulnerability assessment.
Fatemeh Khamespanah +3 more
doaj +1 more source
On Proof-of-Accuracy Consensus Protocols
Consensus protocols are a fundamental part of any blockchain; although several protocols have been in operation for several years, they still have drawbacks.
Fredy Andres Aponte-Novoa +1 more
doaj +1 more source
Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks
Data aggregation in intermediate nodes (called aggregator nodes) is an effective approach for optimizing consumption of scarce resources like bandwidth and energy in Wireless Sensor Networks (WSNs).
Sen, Jaydip
core +1 more source
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Attack graphs are commonly used to analyse the security of medium-sized to large networks. Based on a scan of the network and likelihood information of vulnerabilities, attack graphs can be transformed into Bayesian Attack Graphs (BAGs).
Mace, John +3 more
core +1 more source
ABSTRACT Bone tumours present significant challenges for affected patients, as multimodal therapy often leads to prolonged physical limitations. This is particularly critical during childhood and adolescence, as it can negatively impact physiological development and psychosocial resilience.
Jennifer Queisser +5 more
wiley +1 more source
Mechanisms of parasite‐mediated disruption of brain vessels
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira +3 more
wiley +1 more source
MODELING NETWORK COMPUTER SYSTEMS WITH VULNERABILITIES
Summary: In the paper, a model for discretionary network computer systems with vulnerabilities is proposed. The model is based on the DP-model with functionally or parametrically associated with subjects entities. It is shown how to apply this model for finding all the possible paths to violate the security policy, for representating other models ...
openaire +2 more sources
Time after time – circadian clocks through the lens of oscillator theory
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo +2 more
wiley +1 more source
Automated Vulnerability Discovery and Exploitation in the Internet of Things
Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial:
Zhongru Wang +9 more
doaj +1 more source
Adaptaquin selectively kills glioma stem cells while sparing differentiated brain cells. Transcriptomic and proteomic analyses show Adaptaquin disrupts iron and cholesterol homeostasis, with iron chelation amplifying cytotoxicity via cholesterol depletion, mitochondrial dysfunction, and elevated reactive oxygen species.
Adrien M. Vaquié +16 more
wiley +1 more source

