- Obesogenic environments and cardiovascular disease: a path analysis using US nationally representative data42 days agoRead
- Sensors, Vol. 22, Pages 2944: Green Synthesis of Phosphorescent Carbon Dots for Anticounterfeiting and Information Encryption40 days agoRead
- Kazakhstan: Boost Rights Protection in Constitution Reform2 days agoRead
- A data hiding technique for digital videos using entropy-based blocks selection9 days agoRead
- Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins8 days agoRead
- Sensors, Vol. 22, Pages 3671: A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node11 days agoRead
- IJERPH, Vol. 19, Pages 5778: A Regulatory Game Analysis of Smart Aging Platforms Considering Privacy Protection13 days agoRead
- Land, Vol. 11, Pages 718: Applying Ecological Succession Theory to Birds in Solar Parks: An Approach to Address Protection and Planning12 days agoRead
- Securing Bluetooth Low Energy networking: An overview of security procedures and threats10 days agoRead
- Processes, Vol. 8, Pages 1106: Improving the Energy Efficiency of Industrial Refrigeration Systems by Means of Data-Driven Load Management624 days agoRead
- Data Anonymization Using Pseudonym System to Preserve Data Privacy624 days agoRead
- Information, Vol. 13, Pages 85: Data Processing in Cloud Computing Model on the Example of Salesforce cloud99 days agoRead
- Energies, Vol. 14, Pages 2732: Enhancement of Advanced Metering Infrastructure Performance Using Unsupervised K-Means Clustering Algorithm377 days agoRead
- Protection of dopamine neurons by CDNF and neurturin variant N4 against MPP+ in dissociated cultures from rat mesencephalon271 days agoRead
- Hackers issue bizarre demand to NVDIA: Let us mine cryptocurrency faster or we release your stolen data79 days agoRead
- Computers, Vol. 10, Pages 125: Invariant-Based Safety Assessment of FPGA Projects: Conception and Technique224 days agoRead
- Hackers reportedly threaten to leak data from Gigabyte ransomware attack286 days agoRead
- Hackers Steal Donor Info From Smithsonian, UK National Trust, Other Nonprofits626 days agoRead
- Hacker pleads guilty to blackmailing Adafruit, Bleacher Report, and other sites for bitcoin481 days agoRead
- Hardware Information Flow Tracking363 days agoRead
- Computers, Vol. 10, Pages 160: Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions177 days agoRead
- Computers, Vol. 9, Pages 71: An Evolutionary Approach for the Hierarchical Scheduling of Safety- and Security-Critical Multicore Architectures626 days agoRead
- Computers, Vol. 9, Pages 83: Cybersecurity in Intelligent Transportation Systems586 days agoRead
- Computers, Vol. 9, Pages 100: Folding-BSD Algorithm for Binary Sequence Decomposition523 days agoRead
- Computers, Vol. 10, Pages 88: Using Autoencoders for Anomaly Detection and Transfer Learning in IoT311 days agoRead
- Computers, Vol. 10, Pages 133: Combining Blockchains, Smart Contracts, and Complex Sensors Management Platform for Hyper-Connected SmartCities: An IoT Data Marketplace Use Case218 days agoRead
- Computers, Vol. 11, Pages 16: Adaptive Contextual Risk-Based Model to Tackle Confidentiality-Based Attacks in Fog-IoT Paradigm118 days agoRead
- Computers, Vol. 9, Pages 66: An Efficient Secure Electronic Payment System for E-Commerce633 days agoRead
- Security researchers highlight vulnerability of solar inverters642 days agoRead
- Data Security and Privacy Protection for Cloud Storage: A Survey624 days agoRead
- Data protection laws apply to anyone who collects information about a living individual. So what do researchers in arts, humanities and social sciences need to know?613 days agoRead
- Computers, Vol. 9, Pages 74: Toward a Sustainable Cybersecurity Ecosystem612 days agoRead
- Computers, Vol. 9, Pages 76: Fog Computing for Realizing Smart Neighborhoods in Smart Grids608 days agoRead
- ‘Security is not a bolt-on to the IT function’.584 days agoRead
- Computers, Vol. 9, Pages 103: Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger520 days agoRead
- Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges504 days agoRead
- COMPUTERS IN LIBRARIES: The Road to Simplified Remote Access291 days agoRead
- Security software company McAfee acquired for $14 billion195 days agoRead
- Computer scientists develop smart, less obtrusive tracking system4097 days agoRead
- Information, Vol. 11, Pages 415: Healthcare Professional and User Perceptions of eHealth Data and Record Privacy in Dubai632 days agoRead
- Scientific Opinion of the Scientific Panel on Plant Protection Products and their Residues (PPR Panel) on the genotoxic potential of triazine amine (metabolite common to several sulfonylurea active substances).626 days agoRead
- Data Dependence Analysis for Defects Data of Relay Protection Devices Based on Apriori Algorithm624 days agoRead
- Security controls in infrastructure as code578 days agoRead
- Viruses, Vol. 12, Pages 1232: New RNA Structural Elements Identified in the Coding Region of the Coxsackie B3 Virus Genome569 days agoRead
- Data fusion of in situ geophysical and geotechnical information for levee characterization360 days agoRead
- Viruses, Vol. 13, Pages 1375: Cysteine Mutations in the Ebolavirus Matrix Protein VP40 Promote Phosphatidylserine Binding by Increasing the Flexibility of a Lipid-Binding Loop311 days agoRead
- Viruses, Vol. 13, Pages 1375: Cysteine Mutations in the Ebolavirus Matrix Protein VP40 Promote Phosphatidylserine Binding by Increasing the Flexibility of a Lipid-Binding Loop311 days agoRead
- Information, Vol. 12, Pages 313: Design of an Architecture Contributing to the Protection and Privacy of the Data Associated with the Electronic Health Record293 days agoRead
- Computer-generated hologram manipulation and fast production with a focus on security application193 days agoRead
- Viruses, Vol. 13, Pages 2314: Database and Statistical Analyses of Transcription Factor Binding Sites in the Non-Coding Control Region of JC Virus184 days agoRead
- Medicine - All Feeds
- Allergology and Immunology
- Anatomy and Physiology
- Anesthesiology and Intensive Care
- Biochemistry
- Bioengineering
- Biophysics
- Biotechnology
- Cardiology
- Cardiothoracic Surgery
- Clinical Chemistry
- Clinical Medicine
- Complementary Medicine
- Cytology and Histology
- Dentistry
- Dermatology
- Endocrinology
- Forensic Medicine
- Gastroenterology
- General Practice
- Genetics
- Geriatrics
- Health services and Administration
- Hematology
- Infectious Diseases
- Internal Medicine
- Logopedics
- Medical Education and Humanities
- Medical Microbiology
- Medicine - Other
- Nephrology
- Neurology
- Neurosurgery
- Nursing
- Nutritional Sciences
- Obstetrics and Gynecology
- Occupational Health
- Oncology
- Ophthalmology
- Oral and Maxillofacial Surgery
- Orthopedics and Traumatology
- Otorhinolaryngology and Phoniatrics
- Pathology
- Pediatrics
- Pharmacology and Pharmacotherapy
- Physical and Rehabilitation Medicine
- Plastic Surgery
- Psychiatry
- Psychology
- Public Health
- Radiology
- Respiratory Medicine
- Rheumatology
- Sports Medicine
- Surgery
- Urology