Full Text Available
Access Full Text at Repository
Search Results - "Cybersecurity"
-
Development and validation of the belonging at work scale: Association with mistreatment and leaves
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
Online Article RSS Article -
Examining the mediating effects of metabolic syndrome components on the relationship between dairy product consumption and nonalcoholic fatty liver disease in Korean adults
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Modeling insurance claims using Bayesian nonparametric regression
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Research on hybrid cloud resource scheduling optimization algorithm based on EMPA-ASA
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
The identification of metabolites from gut microbiota in HPV infection via network pharmacology
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Why do self-referent cues facilitate mathematical word problem-solving? Insights from eye tracking
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Can participative leadership and LMX congruence promote collective organizational engagement?
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Effect of impregnation with polyethylene glycols (PEGs) of different end groups on gas separation performance of cross-linked polyethylene oxide (PEO) membranes
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Unsupervised industrial image defect detection based on autoencoder and GANs
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Motor planning, initiation and execution of shoulder abduction against gravity: Evidence from startReact
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Characterization of a C9orf72 Knockout Danio rerio model for ALS and cross-species validation of potential therapeutics screened in Caenorhabditis elegans
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Water-soluble gadolinium fullerenes Gd@C82-TEGs as a potential magnetic resonance imaging contrast agent
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Development and external validity of a nurse-led intervention program to improve palliative care and quality of dying and death in intensive care unit
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Assessing the influence of diverse skills on employability outcomes for IT undergraduates
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
From visual attention to behavioural intention: A relational framework of culturally creative desserts in museum communication
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Effect of different velocity loss thresholds during a resistance training program on jump and sprint performances in trained female athletes
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Discovery of a Roman Quarry for Pozzolanic aggregates in the Euganean Hills Magmatic District, Northeast Italy: A stepwise archaeometric approach
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Pelvic floor exercise: Awareness, knowledge, beliefs and practices among pregnant women in a Ghanaian setting
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Retraction: Adherence towards COVID-19 mitigation measures and its associated factors among Gondar City residents: A community-based cross-sectional study in Northwest Ethiopia
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Effective Coverage of Maternal and Newborn Health Services in Sub-Saharan Africa: What distinguishes high from medium and low performers?
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text