Results 61 to 70 of about 202,881 (332)

The Unified Approach For Organizational Network Vulnerability Assessment

open access: yes, 2013
The present business network infrastructure is quickly varying with latest servers, services, connections, and ports added often, at times day by day, and with a uncontrollably inflow of laptops, storage media and wireless networks.
Jagli, Mrs. Dhanamma   +1 more
core   +1 more source

Strength through diversity: how cancers thrive when clones cooperate

open access: yesMolecular Oncology, EarlyView.
Intratumor heterogeneity can offer direct benefits to the tumor through cooperation between different clones. In this review, Kuiken et al. discuss existing evidence for clonal cooperativity to identify overarching principles, and highlight how novel technological developments could address remaining open questions.
Marije C. Kuiken   +3 more
wiley   +1 more source

An information theoretic metric for measurement vulnerability to data integrity attacks on smart grids

open access: yesIET Smart Grid
A novel metric that describes the vulnerability of the measurements in power systems to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect in terms ...
Xiuzhen Ye   +3 more
doaj   +1 more source

Quantum Vulnerability Analysis to Guide Robust Quantum Computing System Design

open access: yesIEEE Transactions on Quantum Engineering
While quantum computers provide exciting opportunities for information processing, they currently suffer from noise during computation that is not fully understood.
Fang Qi   +6 more
doaj   +1 more source

Copula-Based Vulnerability Analysis of Civil Infrastructure Subjected to Hurricanes

open access: yesFrontiers in Built Environment, 2020
Coastal civil infrastructure can be susceptible to damages caused by hurricanes throughout its service life. Vulnerability assessment is a key component in hazard risk management of civil infrastructure systems.
Yaohan Li, You Dong, Deming Zhu
doaj   +1 more source

Introduction to Computer Network Vulnerabilities [PDF]

open access: yes, 2015
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and procedures, especially security policies and procedures,
openaire   +1 more source

Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells

open access: yesMolecular Oncology, EarlyView.
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller   +17 more
wiley   +1 more source

Design and implementation of website information disclosure assessment system. [PDF]

open access: yesPLoS ONE, 2015
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information.
Ying-Chiang Cho, Jen-Yi Pan
doaj   +1 more source

Computer Network Vulnerabilities

open access: yes, 2009
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure or technical, physical, or other controls that could be exploited ...
openaire   +1 more source

Home - About - Disclaimer - Privacy