Search Results - "Cybersecurity"

  1. When the source is a bot: How people adapt their evaluation strategies to assess AI-generated content

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  2. The effect of game-based education on adherence to treatment and anxiety level in type 2 diabetics started on insulin therapy

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  3. Exploring prenatal care experiences in Ontario, Canada: An equity-oriented qualitative study

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  4. Exploring the spatial coupling relationship between green vegetation carbon stock and recreational intensity in urban parks: A case study of Hangzhou

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  5. Barriers and facilitators in physical activity among youth with cerebral palsy in Sweden: A qualitative study

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  6. Using core components in process evaluation: Passport skills for life

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  7. Correction: Artificial intelligence-based dairy cattle behavior recognition for estrus detection via ensemble fusion of two camera views

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  8. Correction: Back to the future: The advantage of studying key events in human evolution using a new high resolution radiocarbon method

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  9. ‘Sustainable Choices’ - An intervention to promote climate change mitigation behaviours: Study protocol for a randomized controlled trial

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  10. Twelve‑month rehospitalization after IBD‑related hospitalization in Germany: A retrospective cohort study using administrative hospital data

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  11. Predicted antiviral potential of phytochemicals prolific in Cleistanthus bracteosus Jabl. and essential oils of Artemisia scoparia and Thuja orientalis against Nipah virus and Huma...

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  12. The effects of combined balance and plyometric training on change-of-direction and dynamic balance: A meta-analysis

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  13. Myo-inositol versus D-chiro-inositol in murine in vitro follicular development: An experimental study relevant to polycystic ovary syndrome

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  14. Modelling the risk of professional disengagement from a cohort study of 181,676 workers in the south of France

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  15. Validity and reliability of Indonesian version of the digital screen exposure questionnaire (DSEQ) for young children

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  16. Editorial Note: Small object detection algorithm incorporating swin transformer for tea buds

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  17. Retraction: Thioredoxin Glutathione Reductase as a Novel Drug Target: Evidence from Schistosoma japonicum

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  18. Editorial Note: Research on improving the ranging accuracy of ships with stereo vision through Kalman filter optimization

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  19. Correction: Copper technology in the Arabah during the Iron Age and the role of the indigenous population in the industry

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  20. Genotypic distribution and molecular epidemiology of HPV in women in the UAE using PNA-based RT PCR

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article