Results 91 to 100 of about 812,870 (286)

Cybersecurity Access Control: Framework Analysis in a Healthcare Institution

open access: yesJournal of Cybersecurity and Privacy
Cyber threats are continually evolving and becoming increasingly complex, affecting various industries. Healthcare institutions are the second most targeted industry, preceded by manufacturing.
Erik William Tomlinson   +3 more
doaj   +1 more source

Trust among Strangers [PDF]

open access: yes
The trust building process is basic to social science. We investigate it in a laboratory setting using a novel multi-stage trust game where social gains are achieved if players trust each other in each stage.
Keith Weigelt, Teck-Hua Ho
core  

Films can have a major influence on how people view government. [PDF]

open access: yes, 2015
While government is frequently the subject of feature films, we have only a limited understanding on how government’s portrayal on films affect audience’s perceptions of state institutions. In new research, Michelle C.
Pautz, Michelle
core  

RNA Sequencing Resolves Cryptic Pathogenic Variants in Mitochondrial Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Mitochondrial diseases are the most common inherited metabolic disorders, characterized by pronounced clinical and genetic heterogeneity that complicates molecular diagnosis. Although DNA‐based sequencing approaches have become standard in genetic testing, up to half of patients remain without a definitive diagnosis.
Zhimei Liu   +21 more
wiley   +1 more source

Application of Data Security Models in Zero - Trust Architecture from the Data Assets Perspectives

open access: yesDiversitas Journal
Today, data assets have become the core assets of enterprises and organizations, and their security is of utmost importance. The traditional network security architecture has revealed many limitations in protecting data assets, giving rise to the zero -
Fangshu Hu, Jessa Frida Festijo
doaj   +1 more source

An Alternating Trust Region Algorithm for Distributed Linearly Constrained Nonlinear Programs, Application to the AC Optimal Power Flow [PDF]

open access: yes, 2015
A novel trust region method for solving linearly constrained nonlinear programs is presented. The proposed technique is amenable to a distributed implementation, as its salient ingredient is an alternating projected gradient sweep in place of the Cauchy ...
Hours, Jean-Hubert, Jones, Colin N.
core   +1 more source

Prognostic Value of Neurofilament Light Chain and Glial Fibrillary Acidic Protein in ALD‐Related Myelopathy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background X‐linked adrenoleukodystrophy (X‐ALD) is a neurometabolic disorder caused by pathogenic variants in ABCD1, leading to slowly progressive spinal cord disease in nearly all affected men. Sensitive biomarkers to quantify disease severity and predict progression are needed for clinical care and trial design.
Eda G. Kabak   +4 more
wiley   +1 more source

TRIDEnT: Building Decentralized Incentives for Collaborative Security

open access: yes, 2019
Sophisticated mass attacks, especially when exploiting zero-day vulnerabilities, have the potential to cause destructive damage to organizations and critical infrastructure.
Alexopoulos, Nikolaos   +4 more
core  

White Matter Hyperintensity Burden and Short‐Interval Change Associated With Sleep Apnoea in the UK Biobank

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background and Purpose White matter hyperintensities (WMH) are a core neuroimaging marker of cerebral small vessel disease (CSVD). Sleep apnoea (SA) is a recognized vascular risk factor, but its associations with regional WMH burden, short‐interval WMH change and cognitive performance in population‐based cohorts remain incompletely defined. We
Peng Cheng   +4 more
wiley   +1 more source

Prescriptive Zero Trust- Assessing the impact of zero trust on cyber attack prevention

open access: yesCoRR
Increasingly sophisticated and varied cyber threats necessitate ever improving enterprise security postures. For many organizations today, those postures have a foundation in the Zero Trust Architecture. This strategy sees trust as something an enterprise must not give lightly or assume too broadly.
openaire   +2 more sources

Home - About - Disclaimer - Privacy