Results 231 to 240 of about 781,799 (337)
Comparative evaluation of approaches & tools for effective security testing of Web applications. [PDF]
Qadir S, Waheed E, Khanum A, Jehan S.
europepmc +1 more source
Sustainable Cellulose Ionogels With Promising Physical Structure, Properties, and Applications
This study presents a comprehensive overview of cellulose functional gels, focusing on their molecular network design and physical properties. The extensive potential applications of cellulose gels in flexible electronics, biomedicine, and smart engineering are explored in depth. This work provides valuable insights and guidance for future research and
Wenjuan Wang +6 more
wiley +1 more source
Mainzelliste: Ten years of pseudonymization, record linkage, and informed consent management. [PDF]
Tremper G +4 more
europepmc +1 more source
Abstract A recent debate has emerged between Caspar et al. (2024) and Herculano‐Houzel (2023) on inferring extinct dinosaur cognition by estimating brain neuron counts. While thought‐provoking, the discussion largely overlooks the function of cognition, as well as partly neglects the difficulties involved in estimating neuron numbers, which according ...
Thomas Rejsenhus Jensen +7 more
wiley +1 more source
MQTT_UAD: MQTT Under Attack Dataset. A public dataset for the detection of attacks in IoT networks using MQTT protocol. [PDF]
Aveleira-Mata J +5 more
europepmc +1 more source
Abstract Tyrannosaurus is viewed as a model organism in vertebrate paleontology, with numerous studies analyzing its feeding biomechanics. Nonetheless, the evolution of this feeding performance has been under‐addressed in Tyrannosauroidea, especially in basal tyrannosauroids. Here we used muscle‐force reconstruction and finite element analysis (FEA) to
Evan Johnson‐Ransom +4 more
wiley +1 more source
Formalized aspect-oriented misuse case for specifying crosscutting security threats and mitigations. [PDF]
Iqbal S, Faiz RB, Usman M, Rehman SU.
europepmc +1 more source
Chicken Pulmonary MicroRNAs Targeting the PB2 (Segment 1) of Avian Influenza Virus
The PB2 segment of H5N1 is essential for replication and host adaptation. We screened 200 miRNAs and identified five (gga‐miR‐17‐3p, gga‐miR‐29a‐5p, gga‐miR‐1718, gga‐miR‐16c‐5p, and gga‐miR‐1744‐5p) using thermodynamic stability of heteroduplex, seed sequence complementarity, conservation, and accessibility, offering insights into host antiviral ...
Akanksha Choudhary +7 more
wiley +1 more source
WEB APPLICATION SECURITY INSTRUCTIONAL PARADIGMS AND THE IS CURRICULUM [PDF]
J. Laverty, John Scarpino
doaj

