Results 61 to 70 of about 184,016 (328)
Evaluation of Post-Quantum Distributed Ledger Cryptography
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain ...
Robert Campbell Sr.
doaj +2 more sources
Computer Network Vulnerabilities
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure or technical, physical, or other controls that could be exploited ...
openaire +2 more sources
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song+11 more
wiley +1 more source
A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment
As a newly emerging computing paradigm, edge computing shows great capability in supporting and boosting 5G and Internet-of-Things (IoT) oriented applications, e.g., scientific workflows with low-latency, elastic, and on-demand provisioning of ...
Tingyan Long+8 more
doaj
Design and implementation of website information disclosure assessment system. [PDF]
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information.
Ying-Chiang Cho, Jen-Yi Pan
doaj +1 more source
Adjacent Graph Based Vulnerability Assessment for Electrical Networks Considering Fault Adjacent Relationships Among Branches [PDF]
Security issues related to vulnerability assessment in electrical networks are necessary for operators to identify the critical branches. At present, using complex network theory to assess the structural vulnerability of the electrical network is a ...
Huang, Tao+6 more
core
A nucleotide‐independent, pan‐RAS‐targeted DARPin elicits anti‐tumor activity in a multimodal manner
We report a Designed Ankyrin Repeat Protein that binds and inhibits RAS proteins, which serve as central cell signaling hubs and are essential for the progression of many cancers. Its unique feature is that it does not discriminate between different RAS isoforms or mutations and is capable of binding to RAS in both its active (GTP‐bound) and inactive ...
Jonas N. Kapp+13 more
wiley +1 more source
A novel metric that describes the vulnerability of the measurements in power systems to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect in terms ...
Xiuzhen Ye+3 more
doaj +1 more source
Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does not adequately quantify or monetise risks to ...
Dawood Behbehani+3 more
doaj +1 more source
Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model
Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging.
Huamin Yang+7 more
core +1 more source