Full Text Available
Access Full Text at Repository
Search Results - "Cybersecurity"
-
Correction: Optimizing bandwidth utilization and traffic control in ISP networks for enhanced smart agriculture
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
Online Article RSS Article -
Exploring sleep in farmed ungulates: A scoping review protocol
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Developing objective tools to study rock hyrax (Procavia capensis) behaviour in the field
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Targeted near-infrared imaging utilizing a cathepsin-activated fluorophore for the intraoperative detection of canine insulinoma
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Understanding the gut microbiome through a fitness intervention of aerobic and resistance training for individuals with type 2 diabetes mellitus (GUTFIT: A Study Protocol)
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Effects of global versus local trunk muscle strength training on muscle strength, proxies of power and rowing-specific performance in pubertal male rowers
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Retraction: Advancing enterprise risk management with deep learning: A predictive approach using the XGBoost-CNN-BiLSTM model
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Retraction: The green response of financial inclusion, infrastructure development and renewable energy to the environmental sustainability: A newly evidence from OECD economies
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Automatic segmentation of coronary plaques in coronary CT angiography using neural networks
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Correction: Late Acheulian stone-working by the riverbank: Patterns of continuity and change reflected in Jaljulia lithic assemblages, Israel
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Cost-effective DNA extraction method optimized for high yield and long fragments from coastal sediments
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Reimagined diabetic care approach: A qualitative study on the acceptability of mhealth interventions in a LMIC
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
High burden and genetic diversity of β-lactamase-producing Escherichia coli and Klebsiella pneumoniae causing community-acquired urinary tract infections in Southeastern Gabon
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Gendered perspectives of yoga in the Key Stage 1 classroom: Qualitative content analysis indicates contrasting views of teachers and pupils
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
The synergistic interaction between ACE and TMPRSS2 polymorphisms increases the risk of severe COVID-19
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Correction: A trustworthy hybrid model for transparent software defect prediction: SPAM-XAI
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Unexpected diversification of DENV2 genotype III in Colombia: New Insights and application of the globalized nomenclature
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Comprehensive analysis of the potential effect and mechanism of pyroptosis-related genes in treatment-related myeloid tumors
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Correction: Extubation outcomes in critically ill post-craniotomy patients: A retrospective cohort study
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
A deep learning framework for gait-based frailty classification using inertial measurement units
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text