Full Text Available
Access Full Text at Repository
Search Results - "Cybersecurity"
-
When the source is a bot: How people adapt their evaluation strategies to assess AI-generated content
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
Online Article RSS Article -
The effect of game-based education on adherence to treatment and anxiety level in type 2 diabetics started on insulin therapy
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Exploring prenatal care experiences in Ontario, Canada: An equity-oriented qualitative study
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Exploring the spatial coupling relationship between green vegetation carbon stock and recreational intensity in urban parks: A case study of Hangzhou
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Barriers and facilitators in physical activity among youth with cerebral palsy in Sweden: A qualitative study
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Using core components in process evaluation: Passport skills for life
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Correction: Artificial intelligence-based dairy cattle behavior recognition for estrus detection via ensemble fusion of two camera views
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Correction: Back to the future: The advantage of studying key events in human evolution using a new high resolution radiocarbon method
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
‘Sustainable Choices’ - An intervention to promote climate change mitigation behaviours: Study protocol for a randomized controlled trial
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Twelve‑month rehospitalization after IBD‑related hospitalization in Germany: A retrospective cohort study using administrative hospital data
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Predicted antiviral potential of phytochemicals prolific in Cleistanthus bracteosus Jabl. and essential oils of Artemisia scoparia and Thuja orientalis against Nipah virus and Huma...
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
The effects of combined balance and plyometric training on change-of-direction and dynamic balance: A meta-analysis
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Myo-inositol versus D-chiro-inositol in murine in vitro follicular development: An experimental study relevant to polycystic ovary syndrome
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Modelling the risk of professional disengagement from a cohort study of 181,676 workers in the south of France
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Validity and reliability of Indonesian version of the digital screen exposure questionnaire (DSEQ) for young children
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Editorial Note: Small object detection algorithm incorporating swin transformer for tea buds
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Retraction: Thioredoxin Glutathione Reductase as a Novel Drug Target: Evidence from Schistosoma japonicum
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Editorial Note: Research on improving the ranging accuracy of ships with stereo vision through Kalman filter optimization
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Correction: Copper technology in the Arabah during the Iron Age and the role of the indigenous population in the industry
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Genotypic distribution and molecular epidemiology of HPV in women in the UAE using PNA-based RT PCR
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text