Loading…
Loading…
H∞ control for fractional order neural networks with uncertainties subject to deception attacks via Improved memory-event-triggered scheme and Its application
Banu, K. Asmiya, Aparna, T., Tajudeen, M. Mubeen, Rajchakit, Grienggrai, Huang, Tingwen
Published in Neural networks (01.04.2025)
Published in Neural networks (01.04.2025)
Get full text
Journal Article
Loading…
Usage control in computer security: A survey
Lazouski, Aliaksandr, Martinelli, Fabio, Mori, Paolo
Published in Computer science review (01.05.2010)
Published in Computer science review (01.05.2010)
Get full text
Journal Article
Loading…
Loading…
Looking back: three key lessons from 20 years of shaping Japanese genome research regulations
Minari, Jusaku, Yokono, Megumu, Takashima, Kayo, Kokado, Minori, Ida, Ryuichi, Hishiyama, Yutaka
Published in Journal of human genetics (01.11.2021)
Published in Journal of human genetics (01.11.2021)
Get full text
Journal Article
Loading…
Loading…
Ethical and social reflections on the proposed European Health Data Space
Staunton, Ciara, Shabani, Mahsa, Mascalzoni, Deborah, Mežinska, Signe, Slokenberga, Santa
Published in European journal of human genetics : EJHG (01.05.2024)
Published in European journal of human genetics : EJHG (01.05.2024)
Get full text
Journal Article
Loading…
Automatic Challenge Generation for Teaching Computer Security
Ladeira, Ricardo de la Rocha, Obelheiro, Rafael Rodrigues
Published in CLEI electronic journal (01.12.2019)
Published in CLEI electronic journal (01.12.2019)
Get full text
Journal Article
Loading…
Initial Requirements for the Prototyping of an App for a Psychosocial Rehabilitation Project: An Integrative Review
Alfredo Ardisson Cirino Campos, Fagner, Feitosa, Fabio Biasotto, Moll, Marciana Fernandes, Reis, Igor de Oliveira, Sánchez García, José Carlos, Ventura, Carla Aparecida Arena
Published in International journal of environmental research and public health (18.02.2025)
Published in International journal of environmental research and public health (18.02.2025)
Get full text
Journal Article
Loading…
Sovereign by Design: The LIONS Approach to Digital Sovereignty
Year of Publication 2024
Get full text
eBook
Loading…
Loading…
Ten simple rules for improving research data discovery
Contaxis, Nicole, Clark, Jason, Dellureficio, Anthony, Gonzales, Sara, Mannheimer, Sara, Oxley, Peter R., Ratajeski, Melissa A., Surkis, Alisa, Yarnell, Amy M., Yee, Michelle, Holmes, Kristi
Published in PLoS computational biology (01.02.2022)
Published in PLoS computational biology (01.02.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
Clinical Bioinformatician Body of Knowledge-Clinical Laboratory Regulation and Data Security Core: A Report of the Association for Molecular Pathology
Schmidt, Ryan J, Furtado, Larissa V, Fussell, Amber M, Jordan, Danielle, Lebo, Matthew, Syed, Aijazuddin, Temple-Smolkin, Robyn L, Venner, Eric, Worthey, Elizabeth, Carter, Alexis B
Published in The Journal of molecular diagnostics : JMD (01.07.2025)
Published in The Journal of molecular diagnostics : JMD (01.07.2025)
Get full text
Journal Article
Loading…
Technical Innovation, solving the Data Spaces and Marketplaces Interoperability Problems for the Global Data-Driven Economy: i3-MARKET Series - Part III: The i3-MARKET FOSS Handbook
Serrano, Martín, Zappa, Achille, Ashraf, Waheed, Friess, Edgar, Martinez, Iván, Mateus, Márcio, Maló, Pedro, Amicone, Alessandro, Bieliauskaite, Justina, Cugurra, Marina
Year of Publication 2024
Year of Publication 2024
Get full text
eBook
Book
Loading…
Analysis of cybersecurity competencies: Recommendations for telecommunications policy
Szczepaniuk, Edyta Karolina, Szczepaniuk, Hubert
Published in Telecommunications policy (01.04.2022)
Published in Telecommunications policy (01.04.2022)
Get full text
Journal Article