Search Results - "Cybersecurity"

  1. Correction: Spatio-temporal characterization of earthquake sequence parameters and forecasting of strong aftershocks in Xinjiang based on the ETAS model

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  2. Retraction: Modeling and Experimental Analyses Reveals Signaling Plasticity in a Bi-Modular Assembly of CD40 Receptor Activated Kinases

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  3. Cognitive load and pedagogical tension in multi-platform online learning: Evidence from Chinese higher education

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  4. Risk-taking responses to crash experience: Evidence from China

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  5. Perspective of Liberian surgical care providers on ethical issues in global surgical collaborations

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  6. Correction: Automated self-service cohort selection for large-scale population sciences and observational research: The California Teachers Study researcher platform

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  7. Incidence and risk factors of perioperative respiratory adverse events in pediatric surgical patients: Development and validation of a predictive model in Brazil

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  8. Biomolecules involved in the metabolism of Escherichia coli affected by photodynamics: A calorimetry study

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  9. Sugar, mineral, B-vitamins profiles and radical scavenging activity of Royal jelly collected at different harvesting times

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  10. Effective coverage and associated factors of antenatal care service among women who attended antenatal care at West Gojjam Zone Public Hospitals, Northwest Ethiopia

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  11. Prevalence of and factors associated with depressive symptoms among the working population in Thimphu, Bhutan: A cross-sectional study

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  12. Stability analysis of nonlinear algebraic-differential equations with 2-delays and numerical methods

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  13. Validation and refinement of existing methods for timed mating and early pregnancy detection in guinea pigs

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  14. The effect of air pollution on catastrophic health expenditure among middle-aged and older adults in China

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  15. Social prescribing programs involving unpaid caregivers: A scoping review

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  16. Predicting student mental health through entropy-based features and interpretable cross-attention transformer networks

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  17. Controlled comparative study of YOLOv8-Pose, YOLOv11-Pose, and Detectron2 for vertebrae detection and keypoint estimation

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  18. Overseas reception of English translations of Journey to the West: Temporal dynamics, cross-platform sentiment patterns, and topic modeling

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  19. Correction: Functional impact of cardiac implanted devices on ipsilateral shoulder range of motion, scapular mobility, and self-reported quality of life

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  20. Correction: Combining lenalidomide with IL-2 family of cytokines enhances activating receptor and perforin/granzyme expression in NK cells

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article