Search Results - "Cybersecurity"

  1. Implementing allied healthcare professionals in transitional care for older adults with mental health needs: A scoping review

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  2. Does a degree in medicine or a specialist programme or socioeconomic status advance the career of general practitioners in primary healthcare?

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  3. From reductionism to complex systems: Paradigm shift and knowledge evolution in competitive sports research using BERTopic

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  4. Multidimensional factors influencing continuance usage intention of university library self-service systems: An empirical analysis based on an extended TAM-UTAUT

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  5. Health-related quality of life in children with HIV/AIDS: Child and parent perspectives at a tertiary ART clinic in Kathmandu, Nepal

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  6. Editorial Note: Machine learning-driven Diabetes Health Tracer (DHT): Optimizing prognosis using RaSK_GraDe and RaSK_GraDeL models

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  7. Preoperative binaural beats reduce remimazolam dosage and enhance safety in anesthesia induction: A randomized controlled trial

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  8. Vibration-based bearing fault diagnosis in noisy conditions using matrix pencil mean frequency and multilayer perceptron neural networks

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  9. Activity constraints and the emergence of non-scale-free networks: Evidence from hip-hop and academia

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  10. Retraction: MiR-506 Is Down-Regulated in Clear Cell Renal Cell Carcinoma and Inhibits Cell Growth and Metastasis via Targeting FLOT1

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  11. Development of X-SIAGA: A disease X and outbreak preparedness intervention for indigenous households in Selangor, Malaysia

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  12. Community readiness for the program of all-inclusive care for the elderly (PACE): A qualitative study with Korean Americans in Los Angeles

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  13. Prevalence, perceptions and factors associated with non-adherence to hepatotoxicity monitoring among people living with HIV on tuberculosis preventive treatment at Mulago ISS clini...

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  14. Deep inspiration breath hold versus free breathing in postoperative radiotherapy strategy for patients with left-sided breast cancer treated with volumetric modulated arc therapy:...

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  15. Price elasticity of demand for cigarettes in Nepal: Evidence from a lower middle-income country in South Asia using Deaton’s demand model

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  16. Assessment of miRNAs as transcriptional regulators in respiratory syncytial virus infection through computational analysis and molecular docking studies

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  17. Psychosocial predictors of non-adherence to antihypertensive medication among Korean adults: A nationwide cross-sectional study

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  18. Support-seeking and rehoming pathways differ by surrender circumstances among pet owners

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  19. Joint modelling of left- and interval-censored viral load for couples in Mozambique

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  20. Where do they come from and where do they go: Understanding the relationship between deprivation and the geographical journeys of trainee doctors in England

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article