Full Text Available
Access Full Text at Repository
Search Results - "Cybersecurity"
-
Correction: Implementation and Staff Perceptions of a Quality Assurance System in a Finnish Private Hospital During the COVID-19 Pandemic: A Qualitative Study
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
Online Article RSS Article -
Comprehensive post-marketing safety evaluation of atezolizumab: A disproportionality analysis based on individual case safety reports in the FAERS
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Exploratory study on the impact of Ganoderma australe extract on gut microbiota and immune gene expression in honey bees exposed to Vairimorpha ceranae
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Exploring the relationship between mental health and urban green space soundscapes: A scoping review
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Correction: Identification of transposable elements and satellite DNA in the Neotropical species Drosophila amaguana from the Ecuadorian Andean Forests
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Earliest millet cultivation reflects steppe connections, dietary flexibility, and resilience in Bronze Age northern Greece
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Computational frameworks for automated detection and quantification of paroxysmal sympathetic hyperactivity among traumatic brain injury patients
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Retraction: High Glucose Induced Oxidative Stress and Apoptosis in Cardiac Microvascular Endothelial Cells Are Regulated by FoxO3a
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Calculation of ultimate bearing capacity and analysis of bearing characteristics for pile group foundation to underlying offset cave
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Mental health help-seeking intentions among health workers in the east coast of peninsular Malaysia: Perceived barriers and predictive factors
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Methodological review of the design, objectives and sample size of Research for Patient Benefit (RfPB) applications that use an external randomised controlled pilot trial design: A...
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
“The system is a bit broken…” a qualitative exploration of barriers in the pathway for diagnosing Developmental Coordination Disorder
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Protocol for a systematic review and meta-analysis of pharmacological and non-pharmacological interventions for chronic pain management in chronic kidney disease
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Retraction: Population growth poses a significant threat to forest ecosystems: A case study from the Hindukush-Himalayas of Pakistan
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Retraction: Induction of heat shock protein expression in SP2/0 transgenic cells and its effect on the production of monoclonal antibodies
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Adoption and implementation of teleaudiology as a telehealth model in Jordan and Arab countries: A cross-sectional survey
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Self-efficacy mediates the relationship between grit and life satisfaction in a sample of employed university students resident in the United Arab Emirates
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Integrating sequence-based GWAS and comparative genomic analysis reveals conservation and species-specificity of putative functional variants influencing tail length and tail abnor...
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Simulation of phased alerting of community first responders for cardiac arrest
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Single-cell transcriptomic profiling of C. elegans Q neuroblast lineage during migration and differentiation
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text