- Methods and applications of full-filed optical coherence tomography: a review1 day agoRead
- Sensors, Vol. 22, Pages 3903: SRE_BBC: A Self-Adaptive Security Enabled Requirements Engineering Approach for SLA Smart Contracts in Blockchain-Based Cloud Systems1 day agoRead
- Sensors, Vol. 22, Pages 3903: SRE_BBC: A Self-Adaptive Security Enabled Requirements Engineering Approach for SLA Smart Contracts in Blockchain-Based Cloud Systems1 day agoRead
- Electronics, Vol. 11, Pages 1624: Blockchain-Enabled: Multi-Layered Security Federated Learning Platform for Preserving Data Privacy3 days agoRead
- Cyber Safeguards: Do Digital Prophylactics Have Holes?3 days agoRead
- Robust Anomaly Detection in Feature-Evolving Time Series4 days agoRead
- Energies, Vol. 15, Pages 3624: A Classy Multifacet Clustering and Fused Optimization Based Classification Methodologies for SCADA Security7 days agoRead
- Sustainability, Vol. 14, Pages 5810: A Semantic Approach for Building System Operations: Knowledge Representation and Reasoning11 days agoRead
- A sports and health application for patients with type 1 diabetes mellitus -An end-user survey on expectations and requirements18 days agoRead
- Sensors, Vol. 22, Pages 3751: Digital Image Representation by Atomic Functions: The Compression and Protection of Data for Edge Computing in IoT Systems8 days agoRead
- Sensors, Vol. 22, Pages 3751: Digital Image Representation by Atomic Functions: The Compression and Protection of Data for Edge Computing in IoT Systems8 days agoRead
- Sensors, Vol. 22, Pages 3744: Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets8 days agoRead
- Sensors, Vol. 22, Pages 3744: Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets8 days agoRead
- Land, Vol. 11, Pages 22: The Trade-Offs between Supply and Demand Dynamics of Ecosystem Services in the Bay Areas of Metropolitan Regions: A Case Study in Quanzhou, China150 days agoRead
- Factors Related to Health Informatics Competencies for Nurses-Results of a National Electronic Health Record Survey12 days agoRead
- Sustainability, Vol. 14, Pages 2141: An Improved Binomial Distribution-Based Trust Management Algorithm for Remote Patient Monitoring in WBANs97 days agoRead
- Mathematics, Vol. 10, Pages 1635: Enhancing Supply Chain Agility with Industry 4.0 Enablers to Mitigate Ripple Effects Based on Integrated QFD-MCDM: An Empirical Study of New Energy Materials Manufacturers11 days agoRead
- North Korea Acknowledges Health Crisis amid Covid-19 Outbreak5 days agoRead
- Inventions, Vol. 5, Pages 58: An Ethereum Blockchain-Based Prototype for Data Security of Regulated Electricity Market541 days agoRead
- Navigating the challenges remote working poses for network and system security569 days agoRead
- Information, Vol. 12, Pages 460: Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures195 days agoRead
- Lightweight Feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment557 days agoRead
- Nutrients, Vol. 13, Pages 3345: A Rapid Review of Territorialized Food Systems and Their Impacts on Human Health, Food Security, and the Environment240 days agoRead
- Nutrients, Vol. 13, Pages 3345: A Rapid Review of Territorialized Food Systems and Their Impacts on Human Health, Food Security, and the Environment240 days agoRead
- A network approach for managing ecosystem services and improving food and nutrition security on smallholder farms24 days agoRead
- Symmetry, Vol. 14, Pages 237: Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA116 days agoRead
- Sensors, Vol. 21, Pages 28: Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy515 days agoRead
- Social Sciences, Vol. 10, Pages 267: Youth Violence and Human Security in Nigeria314 days agoRead
- Rethinking food and nutrition security among a former hunter-gatherer group in Namibia : The impacts of the local food environment and multi-dimensional drivers of food choices on diet quality641 days agoRead
- Sustainability, Vol. 13, Pages 8120: A Review of Monitoring Technologies for Solar PV Systems Using Data Processing Modules and Transmission Protocols: Progress, Challenges and Prospects305 days agoRead
- Data-Driven Security for Smart City Systems: Carving a Trail624 days agoRead
- Foreign Hackers Cripple Texas County’s Email System, Raising Election Security Concerns605 days agoRead
- Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study624 days agoRead
- Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study624 days agoRead
- Perceived Security Risk Based on Moderating Factors for Blockchain Technology Applications in Cloud Storage to Achieve Secure Healthcare Systems123 days agoRead
- The best home security systems (and the one company you'll want to avoid)91 days agoRead
- New advice helps education and research community prevent ransomware attacks612 days agoRead
- ‘Security is not a bolt-on to the IT function’.584 days agoRead
- Security and Privacy of mHealth Applications: A Scoping Review624 days agoRead
- Security and Privacy in IoT Smart Healthcare278 days agoRead
- “Who is watching the watchdog?”: ethical perspectives of sharing health-related data for precision medicine in Singapore549 days agoRead
- Systems, Vol. 8, Pages 41: Realizing the Role of Permissioned Blockchains in a Systems Engineering Lifecycle565 days agoRead
- Sensors, Vol. 21, Pages 6970: Toward the Integration of Cyber and Physical Security Monitoring Systems for Critical Infrastructures214 days agoRead
- Data replication schemes in cloud computing: a survey389 days agoRead
- A Novel and Efficient 3D Multiple Images Encryption Scheme Based on Chaotic Systems and Swapping Operations624 days agoRead
- Mapping, Infrastructure, and Data Analysis for the Brazilian Network of Rare Diseases: Protocol for the RARASnet Observational Cohort Study485 days agoRead
- Sensors, Vol. 21, Pages 4759: Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures314 days agoRead
- Sensors, Vol. 21, Pages 4759: Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures314 days agoRead
- SimpliSafe's award-winning home security systems are all on sale for 40% off254 days agoRead
- New Evidence that Biometric Data Systems Imperil Afghans53 days agoRead
- Medicine - All Feeds
- Allergology and Immunology
- Anatomy and Physiology
- Anesthesiology and Intensive Care
- Biochemistry
- Bioengineering
- Biophysics
- Biotechnology
- Cardiology
- Cardiothoracic Surgery
- Clinical Chemistry
- Clinical Medicine
- Complementary Medicine
- Cytology and Histology
- Dentistry
- Dermatology
- Endocrinology
- Forensic Medicine
- Gastroenterology
- General Practice
- Genetics
- Geriatrics
- Health services and Administration
- Hematology
- Infectious Diseases
- Internal Medicine
- Logopedics
- Medical Education and Humanities
- Medical Microbiology
- Medicine - Other
- Nephrology
- Neurology
- Neurosurgery
- Nursing
- Nutritional Sciences
- Obstetrics and Gynecology
- Occupational Health
- Oncology
- Ophthalmology
- Oral and Maxillofacial Surgery
- Orthopedics and Traumatology
- Otorhinolaryngology and Phoniatrics
- Pathology
- Pediatrics
- Pharmacology and Pharmacotherapy
- Physical and Rehabilitation Medicine
- Plastic Surgery
- Psychiatry
- Psychology
- Public Health
- Radiology
- Respiratory Medicine
- Rheumatology
- Sports Medicine
- Surgery
- Urology