Results 231 to 240 of about 372,889 (280)
Some of the next articles are maybe not open access.

Thermal detection of vulnerable plaque

The American Journal of Cardiology, 2002
In 1996, we showed that inflamed atherosclerotic plaques give off more heat and that vulnerable plaques may be detected by measuring their temperature. Plaque temperature is correlated directly with inflammatory cell density and inversely with the distance of the cell clusters from the luminal surface.
Mohammad, Madjid   +5 more
openaire   +2 more sources

Applied Vulnerability Detection System

2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015
In [1], we presented a Vulnerability Detection System (VDS) that can detect emergent vulnerabilities in complex Cyber Physical Systems (CPS). It used the attacker's point of view by collecting a target system's vulnerability information from varied sources, and populating a Attack Point (AP) database.
Jeffrey Smith   +3 more
openaire   +1 more source

PVD: Passive vulnerability detection

2017 8th International Conference on Information and Communication Systems (ICICS), 2017
The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new
Marian Gawron   +2 more
openaire   +1 more source

Improving vulnerability detection measurement

Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering, 2016
The Software Assurance Metrics and Tool Evaluation (SAMATE) project at the National Institute of Standards and Technology (NIST) has created the Software Assurance Reference Dataset (SARD) to provide researchers and software security assurance tool developers with a set of known security flaws. As part of an empirical evaluation of a runtime monitoring
Alexander M. Hoole   +3 more
openaire   +1 more source

Vulnerability detection techniques

2020
The focus of this Master’s thesis project is automated penetration testing. A penetration test is a practice used by security professionals to assess the security of a system. This process consists of attacking the system in order to reveal flaws. In order to perform one, some tests need to be done using several tools. But these tools are the same most
openaire   +1 more source

Current status of vulnerable plaque detection

Catheterization and Cardiovascular Interventions, 2009
AbstractCritical coronary stenoses have been shown to contribute to only a minority of acute coronary syndromes (ACS) and sudden cardiac death. Autopsy studies have identified a subgroup of high‐risk patients with disrupted vulnerable plaque and modest stenosis.
Faisal, Sharif, Ross T, Murphy
openaire   +2 more sources

Detection of Vulnerable Plaque

2019
The use of optical coherence tomography (OCT) imaging in research and clinical practice has provided useful insights into the pathobiology of the “vulnerable plaque” and acute coronary syndromes (ACS). Although thin-cap fibroatheroma (TCFA), defined as a lipid-rich plaque covered by a thin (i.e.,
Vergallo R, Jang IK
openaire   +1 more source

Current Diagnostic Modalities for Vulnerable Plaque Detection

Current Pharmaceutical Design, 2007
Rupture of vulnerable plaques is the main cause of acute coronary syndrome and myocardial infarction. Identification of vulnerable plaques is therefore essential to enable the development of treatment modalities to stabilize such plaques. Several diagnostic methods are currently tested to detect vulnerable plaques.
Schaar, Johannes   +7 more
openaire   +3 more sources

Multi-Language Web Vulnerability Detection

2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2020
Most web applications are compromised due to vulnerable source code [1]. Static code analysis tools that are often used to find security vulnerabilities in code have two main problems: they are language-specific, and they have to be programmed, or at least configured manually, to deal with new types of vulnerabilities.
Alexandra Figueiredo   +2 more
openaire   +1 more source

Detecting vulnerable plaque with vulnerability index based on convolutional neural networks

Computerized Medical Imaging and Graphics, 2020
Plaque rupture and subsequent thrombosis are major processes of acute cardiovascular events. The Vulnerability Index is a very important indicator of whether a plaque is ruptured, and these easily ruptured or fragile plaques can be detected early. The higher the general vulnerability index, the higher the instability of the plaque.
Yankun Cao   +7 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy