Full Text Available
Access Full Text at Repository
Search Results - "Cybersecurity"
-
Characteristics of transferrin saturation and anemia-related biomarkers in patients with uterine adenomyosis
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
Online Article RSS Article -
Prevalence and risk factors of asymptomatic bacteriuria in community-dwelling Korean adults
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Enhancing cropping intensity and system productivity through early-bulking potato genotypes in potato-based cropping systems
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
The potential roles of androgen and estrogen receptors during reproductive cycle in Pampus argenteus
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Comparing undesirable behaviours between ‘designer’ Poodle-cross dogs and their purebred progenitor breeds
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Preparation and application of Taq DNA polymerase monoclonal antibody guided by structural domain analysis
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Seasonal variation in hospitalizations for peptic ulcer disease: A five-year retrospective study from Latvia
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Mutual solubilization of rosiglitazone and ibuprofen: Investigation and mechanistic insight
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
A GeoAI framework for detecting risk zones from illegal dumping sites in Khulna, Bangladesh
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Facilitators of and barriers to labor market participation among people with acquired deafblindness: A scoping review
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Expression of concern: Optimizing load scheduling and data distribution in heterogeneous cloud environments using fuzzy-logic based two-level framework
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Retraction: The regulation of HBP1, SIRT1, and SREBP-1c genes and the related microRNAs in non-alcoholic fatty liver rats: The association with the folic acid anti-steatosis
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Expression of Concern: Schizophrenia as a Network Disease: Disruption of Emergent Brain Function in Patients with Auditory Hallucinations
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Expression of Concern: Ensemble learning approach for advanced metering infrastructure in future smart grids
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Intergenerational effects of the pre-conception period on the number of services required by the daughter in dairy cows
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Polydrug use with opioid involvement: Results from a national sample of U.S. civilians aged 12 years or older
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Data-driven p-norms for estimating transmission loss coefficients in power systems
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Designing a flipped AI-chatbot learning module to support students’ environmental literacy development: A Fuzzy Delphi Method
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Initial arterial access used and associated factors in coronary procedures: A retrospective study from a tertiary indian center
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
A practical evaluation of statistical methods for the analysis of patient reported outcomes in an observational pharmaceutical study
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text