Results 51 to 60 of about 202,881 (332)
Evaluation of Post-Quantum Distributed Ledger Cryptography
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain ...
Robert Campbell Sr.
doaj +2 more sources
A framework to quantify the vulnerability of insular biota to global changes
The majority of vulnerability assessments of biodiversity to global changes have so far been applied to, and designed for, mainland systems, overlooking islands. However, islands harbour unique biodiversity and are epicentres of ongoing extinctions.
Bellard, Céline +17 more
doaj +1 more source
With the widespread use of Internet of Things and cloud computing in smart cities, various security and privacy challenges may be encountered.The most basic problem is authentication between each application, such as participating users, IoT devices ...
Huihui Huang +3 more
doaj +1 more source
Two theoretical dimensions of the cyber hate crime [PDF]
The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of
Salas, Cesar Rommel
core
A DDoS Vulnerability Analysis System against Distributed SDN Controllers in a Cloud Computing Environment [PDF]
Sumit Badotra +6 more
openalex +1 more source
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker +16 more
wiley +1 more source
An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks
As today's organizational computer networks are ever evolving and becoming more and more complex, finding potential vulnerabilities and conducting security audits has become a crucial element in securing these networks.
Bray B. +10 more
core +1 more source
Effect of chemotherapy on passenger mutations in metastatic colorectal cancer
Changes in passenger mutation load and predicted immunotherapy response after chemotherapy treatment. Tumor cells rich with passenger mutations have increased sensitivity to chemotherapy. Correlation of passenger mutations with neoantigen load suggests highly mutated clones promote a more effective response to immunotherapy, and therefore, first‐line ...
Marium T. Siddiqui +6 more
wiley +1 more source
Identification of vulnerable non-culprit lesions by coronary computed tomography angiography in patients with chronic coronary syndrome and diabetes mellitus [PDF]
Jia Zhao +13 more
openalex +1 more source
Dual targeting of RET and SRC synergizes in RET fusion‐positive cancer cells
Despite the strong activity of selective RET tyrosine kinase inhibitors (TKIs), resistance of RET fusion‐positive (RET+) lung cancer and thyroid cancer frequently occurs and is mainly driven by RET‐independent bypass mechanisms. Son et al. show that SRC TKIs significantly inhibit PAK and AKT survival signaling and enhance the efficacy of RET TKIs in ...
Juhyeon Son +13 more
wiley +1 more source

