Search Results - "Cybersecurity"

Refine Results
  1. Correction: Optimizing bandwidth utilization and traffic control in ISP networks for enhanced smart agriculture

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  2. Exploring sleep in farmed ungulates: A scoping review protocol

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  3. Developing objective tools to study rock hyrax (Procavia capensis) behaviour in the field

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  4. Targeted near-infrared imaging utilizing a cathepsin-activated fluorophore for the intraoperative detection of canine insulinoma

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  5. Understanding the gut microbiome through a fitness intervention of aerobic and resistance training for individuals with type 2 diabetes mellitus (GUTFIT: A Study Protocol)

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  6. Effects of global versus local trunk muscle strength training on muscle strength, proxies of power and rowing-specific performance in pubertal male rowers

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  7. Retraction: Advancing enterprise risk management with deep learning: A predictive approach using the XGBoost-CNN-BiLSTM model

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  8. Retraction: The green response of financial inclusion, infrastructure development and renewable energy to the environmental sustainability: A newly evidence from OECD economies

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  9. Automatic segmentation of coronary plaques in coronary CT angiography using neural networks

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  10. Correction: Late Acheulian stone-working by the riverbank: Patterns of continuity and change reflected in Jaljulia lithic assemblages, Israel

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  11. Cost-effective DNA extraction method optimized for high yield and long fragments from coastal sediments

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  12. Reimagined diabetic care approach: A qualitative study on the acceptability of mhealth interventions in a LMIC

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  13. High burden and genetic diversity of β-lactamase-producing Escherichia coli and Klebsiella pneumoniae causing community-acquired urinary tract infections in Southeastern Gabon

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  14. Gendered perspectives of yoga in the Key Stage 1 classroom: Qualitative content analysis indicates contrasting views of teachers and pupils

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  15. The synergistic interaction between ACE and TMPRSS2 polymorphisms increases the risk of severe COVID-19

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  16. Correction: A trustworthy hybrid model for transparent software defect prediction: SPAM-XAI

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  17. Unexpected diversification of DENV2 genotype III in Colombia: New Insights and application of the globalized nomenclature

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  18. Comprehensive analysis of the potential effect and mechanism of pyroptosis-related genes in treatment-related myeloid tumors

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  19. Correction: Extubation outcomes in critically ill post-craniotomy patients: A retrospective cohort study

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article
  20. A deep learning framework for gait-based frailty classification using inertial measurement units

    Published in PLOS ONE (2026)
    Subjects: “…Cybersecurity, Cryptography and Privacy…”
    Get full text
    Online Article RSS Article