Results 61 to 70 of about 184,016 (328)

Evaluation of Post-Quantum Distributed Ledger Cryptography

open access: yesThe Journal of The British Blockchain Association, 2019
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain ...
Robert Campbell Sr.
doaj   +2 more sources

Computer Network Vulnerabilities

open access: yes, 2009
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure or technical, physical, or other controls that could be exploited ...
openaire   +2 more sources

Comprehensive omics‐based classification system in adult patients with B‐cell acute lymphoblastic leukemia

open access: yesMolecular Oncology, EarlyView.
The COMBAT classification system, developed through multi‐omics integration, stratifies adult patients with B‐cell acute lymphoblastic leukemia(B‐ALL) into three molecular subtypes with distinct surface antigen patterns, immune landscape, methylation patterns, biological pathways and prognosis.
Yang Song   +11 more
wiley   +1 more source

A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment

open access: yesDigital Communications and Networks, 2022
As a newly emerging computing paradigm, edge computing shows great capability in supporting and boosting 5G and Internet-of-Things (IoT) oriented applications, e.g., scientific workflows with low-latency, elastic, and on-demand provisioning of ...
Tingyan Long   +8 more
doaj  

Design and implementation of website information disclosure assessment system. [PDF]

open access: yesPLoS ONE, 2015
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information.
Ying-Chiang Cho, Jen-Yi Pan
doaj   +1 more source

Adjacent Graph Based Vulnerability Assessment for Electrical Networks Considering Fault Adjacent Relationships Among Branches [PDF]

open access: yes, 2019
Security issues related to vulnerability assessment in electrical networks are necessary for operators to identify the critical branches. At present, using complex network theory to assess the structural vulnerability of the electrical network is a ...
Huang, Tao   +6 more
core  

A nucleotide‐independent, pan‐RAS‐targeted DARPin elicits anti‐tumor activity in a multimodal manner

open access: yesMolecular Oncology, EarlyView.
We report a Designed Ankyrin Repeat Protein that binds and inhibits RAS proteins, which serve as central cell signaling hubs and are essential for the progression of many cancers. Its unique feature is that it does not discriminate between different RAS isoforms or mutations and is capable of binding to RAS in both its active (GTP‐bound) and inactive ...
Jonas N. Kapp   +13 more
wiley   +1 more source

An information theoretic metric for measurement vulnerability to data integrity attacks on smart grids

open access: yesIET Smart Grid
A novel metric that describes the vulnerability of the measurements in power systems to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect in terms ...
Xiuzhen Ye   +3 more
doaj   +1 more source

Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does not adequately quantify or monetise risks to ...
Dawood Behbehani   +3 more
doaj   +1 more source

Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model

open access: yes, 2019
Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging.
Huamin Yang   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy