Download full-text PDF

Source
http://dx.doi.org/10.1001/jamanetworkopen.2018.5298DOI Listing

Publication Analysis

Top Keywords

threats validity
4
validity clinical
4
clinical interview
4
interview done?
4
threats
1
clinical
1
interview
1
done?
1

Similar Publications

Echinococcosis is a zoonotic infectious disease that poses a significant threat to the health of individuals living in rural regions. While vaccination represents a potential strategy for disease prevention, there is currently no effective vaccine available for humans to prevent cystic echinococcosis (CE). This study aimed to design a novel multi-epitope vaccine (MEV) against Echinococcus granulosus for human use, employing immunoinformatics methods.

View Article and Find Full Text PDF

The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy. To address these vulnerabilities, we previously proposed the 5G-AKA-Forward Secrecy (5G-AKA-FS) protocol, which introduces an ephemeral key pair within the home network (HN) to support forward secrecy and prevent linkability attacks. However, a re-evaluation uncovered minor errors in the initial BAN-logic verification and highlighted the need for more rigorous security validation using formal methods.

View Article and Find Full Text PDF

Multi-layer conductive structures, especially those with features like bolt holes, are vulnerable to hidden corrosion and cracking, posing a serious threat to equipment integrity. Early defect detection is vital for implementing effective maintenance strategies. However, the subtle signals produced by these defects necessitate highly sensitive non-destructive testing (NDT) techniques.

View Article and Find Full Text PDF

Enhanced Intrusion Detection for ICS Using MS1DCNN and Transformer to Tackle Data Imbalance.

Sensors (Basel)

December 2024

School of Artificial Intelligence and Data Science, Hebei University of Technology, Tianjin 300132, China.

With the escalating threat posed by network intrusions, the development of efficient intrusion detection systems (IDSs) has become imperative. This study focuses on improving detection performance in programmable logic controller (PLC) network security while addressing challenges related to data imbalance and long-tail distributions. A dataset containing five types of attacks targeting programmable logic controllers (PLCs) in industrial control systems (ICS) was first constructed.

View Article and Find Full Text PDF

Application of LC-MS/MS for the Identification of Drugs of Abuse in Driver's License Regranting Procedures.

Pharmaceuticals (Basel)

December 2024

Laboratory of Forensic Toxicology, Section of Legal Medicine, Social Security and Forensic Toxicology, Department of Biomedicine and Prevention, Faculty of Medicine and Surgery, University of Rome "Tor Vergata", Via Montpellier 1, 00133 Rome, Italy.

Drugged driving is associated with an increased risk of road accidents worldwide. In Italy, driving under the influence (DUI) of alcohol and drugs is a reason for driving disqualification or revocation of the driving license. Drivers charged with driving under the influence of alcohol and drugs must attend a Local Medical Commission (LMC) to undergo mandatory examinations to regain the suspended license.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!