International Journal of Security and Its Applications最新文献

筛选
英文 中文
From activation dynamics to functional diversity of retinal proteins: Report for the session 3 at the 19th International Conference on Retinal Proteins. 从视网膜蛋白的活化动力学到功能多样性:第 19 届视网膜蛋白质国际会议第 3 单元报告。
International Journal of Security and Its Applications Pub Date : 2022-12-28 eCollection Date: 2023-03-21 DOI: 10.2142/biophysico.bppb-v20.s003
Chii-Shen Yang, Mikio Kataoka
{"title":"From activation dynamics to functional diversity of retinal proteins: Report for the session 3 at the 19<sup>th</sup> International Conference on Retinal Proteins.","authors":"Chii-Shen Yang, Mikio Kataoka","doi":"10.2142/biophysico.bppb-v20.s003","DOIUrl":"10.2142/biophysico.bppb-v20.s003","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"9 1","pages":"e201003"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10865879/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89138067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Self-monitoring of Blood Pressure on Diagnosis of Hypertension During Higher-Risk Pregnancy: The BUMP 1 Randomized Clinical Trial. 自我监测血压对高危妊娠期高血压诊断的影响:BUMP 1 随机临床试验。
IF 20.4
International Journal of Security and Its Applications Pub Date : 2022-05-03 DOI: 10.1001/jama.2022.4712
Katherine L Tucker, Sam Mort, Ly-Mee Yu, Helen Campbell, Oliver Rivero-Arias, Hannah M Wilson, Julie Allen, Rebecca Band, Alison Chisholm, Carole Crawford, Greig Dougall, Lazarina Engonidou, Marloes Franssen, Marcus Green, Sheila Greenfield, Lisa Hinton, James Hodgkinson, Layla Lavallee, Paul Leeson, Christine McCourt, Lucy Mackillop, Jane Sandall, Mauro Santos, Lionel Tarassenko, Carmelo Velardo, Lucy Yardley, Lucy C Chappell, Richard J McManus
{"title":"Effect of Self-monitoring of Blood Pressure on Diagnosis of Hypertension During Higher-Risk Pregnancy: The BUMP 1 Randomized Clinical Trial.","authors":"Katherine L Tucker, Sam Mort, Ly-Mee Yu, Helen Campbell, Oliver Rivero-Arias, Hannah M Wilson, Julie Allen, Rebecca Band, Alison Chisholm, Carole Crawford, Greig Dougall, Lazarina Engonidou, Marloes Franssen, Marcus Green, Sheila Greenfield, Lisa Hinton, James Hodgkinson, Layla Lavallee, Paul Leeson, Christine McCourt, Lucy Mackillop, Jane Sandall, Mauro Santos, Lionel Tarassenko, Carmelo Velardo, Lucy Yardley, Lucy C Chappell, Richard J McManus","doi":"10.1001/jama.2022.4712","DOIUrl":"10.1001/jama.2022.4712","url":null,"abstract":"<p><strong>Importance: </strong>Inadequate management of elevated blood pressure (BP) is a significant contributing factor to maternal deaths. Self-monitoring of BP in the general population has been shown to improve the diagnosis and management of hypertension; however, little is known about its use in pregnancy.</p><p><strong>Objective: </strong>To determine whether self-monitoring of BP in higher-risk pregnancies leads to earlier detection of pregnancy hypertension.</p><p><strong>Design, setting, and participants: </strong>Unblinded, randomized clinical trial that included 2441 pregnant individuals at higher risk of preeclampsia and recruited at a mean of 20 weeks' gestation from 15 hospital maternity units in England between November 2018 and October 2019. Final follow-up was completed in April 2020.</p><p><strong>Interventions: </strong>Participating individuals were randomized to either BP self-monitoring with telemonitoring (n = 1223) plus usual care or usual antenatal care alone (n = 1218) without access to telemonitored BP.</p><p><strong>Main outcomes and measures: </strong>The primary outcome was time to first recorded hypertension measured by a health care professional.</p><p><strong>Results: </strong>Among 2441 participants who were randomized (mean [SD] age, 33 [5.6] years; mean gestation, 20 [1.6] weeks), 2346 (96%) completed the trial. The time from randomization to clinic recording of hypertension was not significantly different between individuals in the self-monitoring group (mean [SD], 104.3 [32.6] days) vs in the usual care group (mean [SD], 106.2 [32.0] days) (mean difference, -1.6 days [95% CI, -8.1 to 4.9]; P = .64). Eighteen serious adverse events were reported during the trial with none judged as related to the intervention (12 [1%] in the self-monitoring group vs 6 [0.5%] in the usual care group).</p><p><strong>Conclusions and relevance: </strong>Among pregnant individuals at higher risk of preeclampsia, blood pressure self-monitoring with telemonitoring, compared with usual care, did not lead to significantly earlier clinic-based detection of hypertension.</p><p><strong>Trial registration: </strong>ClinicalTrials.gov Identifier: NCT03334149.</p>","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"10 1","pages":"1656-1665"},"PeriodicalIF":20.4,"publicationDate":"2022-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9066279/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89137640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capturing Security Mechanisms Applied to Ecommerce: An Analysis of Transaction Security 捕获安全机制在电子商务中的应用——交易安全分析
International Journal of Security and Its Applications Pub Date : 2021-03-31 DOI: 10.33832/ijsia.2021.15.1.01
Ranie B. Canlas
{"title":"Capturing Security Mechanisms Applied to Ecommerce: An Analysis of Transaction Security","authors":"Ranie B. Canlas","doi":"10.33832/ijsia.2021.15.1.01","DOIUrl":"https://doi.org/10.33832/ijsia.2021.15.1.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42678781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain Approach to Cyber Security Vulnerabilities Attacks and Potential Countermeasures 区块链方法应对网络安全漏洞攻击及潜在对策
International Journal of Security and Its Applications Pub Date : 2020-03-31 DOI: 10.33832/ijsia.2020.14.1.01
Bosubabu Samban, Y. Ramesh, M. .. Rao, T. C. Rao
{"title":"Blockchain Approach to Cyber Security Vulnerabilities Attacks and Potential Countermeasures","authors":"Bosubabu Samban, Y. Ramesh, M. .. Rao, T. C. Rao","doi":"10.33832/ijsia.2020.14.1.01","DOIUrl":"https://doi.org/10.33832/ijsia.2020.14.1.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"14 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41400409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mitigation of Wireless Body Area Networks Challenges using Cooperation 利用协作缓解无线身体区域网络的挑战
International Journal of Security and Its Applications Pub Date : 2020-03-31 DOI: 10.33832/ijsia.2020.14.1.02
Zeeshan Haider, Tauseef Jamal, M. Asam, S. A. Butt, A. Ajaz
{"title":"Mitigation of Wireless Body Area Networks Challenges using Cooperation","authors":"Zeeshan Haider, Tauseef Jamal, M. Asam, S. A. Butt, A. Ajaz","doi":"10.33832/ijsia.2020.14.1.02","DOIUrl":"https://doi.org/10.33832/ijsia.2020.14.1.02","url":null,"abstract":"— The degradation of an adequate medical facilities for safety and healthy human atmosphere motivated researchers to think more generously to provide a smart solution in medical applications. Wireless body area network (WBAN) is one of the potential platform to cope up to the needs of prevailing medical demands and challenges. In the literature, WBAN is a femto-network (ranges up to few meters) formation around a human body for sensing, transmission and reception functionality. These functionalities are executed using various modes by placement of sensors node on human posture or by injecting inside of the human body. This mode of communication have various challenges when deployed in medical applications. Due to the critical nature of human physiological sensed data which demands a reliable and secure transmission, reception between sensors, intermediate and master node. This article outcomes are two fold, first is the state of art challenges of WBAN and the need of the ultimate smart solution for safe and reliable communication in Wireless body area Networks. Secondly, using Cooperation techniques for mitigation of WBAN issues, proposed cooperative model is presented for reliable data transmission using an efficient network resource utilization mechanism.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47204281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving the Security Quality of Use Case Models through the Application of Software Refactoring Using Genetic Algorithm 应用遗传算法进行软件重构提高用例模型的安全性
International Journal of Security and Its Applications Pub Date : 2020-03-31 DOI: 10.33832/ijsia.2020.14.1.03
Haris Mumtaz, M. Alshayeb, S. Mahmood, M. Niazi
{"title":"Improving the Security Quality of Use Case Models through the Application of Software Refactoring Using Genetic Algorithm","authors":"Haris Mumtaz, M. Alshayeb, S. Mahmood, M. Niazi","doi":"10.33832/ijsia.2020.14.1.03","DOIUrl":"https://doi.org/10.33832/ijsia.2020.14.1.03","url":null,"abstract":"— Use case modelling is an industrial de-facto standard technique to express functional requirements. Security bad smells are design flaws that can potentially degrade the quality of software by affecting a system’s ability to prevent malicious activities. The presence of security bad smells in a use case model is likely to propagate security vulnerabilities to other software artefacts. Therefore, the detection and refactoring of security bad smells in use case models is important for ensuring the overall quality of software systems. In this paper, we propose a genetic algorithm-based detection approach to detect security bad smells. A refactoring process is then applied to correct the security bad smells. Finally, the improvement to security is assessed through the statistical analysis of quality metrics. The practicality of the approach is demonstrated by applying it to a set of use case models. The results show that the proposed security bad smell detection and correction technique can significantly improve the quality of use case models.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48130277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Ensemble Classification Approach with Selective Under and Over Sampling of Imbalance Intrusion Detection Dataset 不平衡入侵检测数据集的选择性欠采样和过采样集成分类方法
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.05
Priyanka Tripathi, R. Makwana
{"title":"An Ensemble Classification Approach with Selective Under and Over Sampling of Imbalance Intrusion Detection Dataset","authors":"Priyanka Tripathi, R. Makwana","doi":"10.33832/ijsia.2019.13.4.05","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":"41-50"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45087269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Communication of Two Controller Area Network Segments through Wireless Sensor Network 无线传感器网络中两个控制器区域网段的通信
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.01
S. Makka, B. B. Sagar
{"title":"Communication of Two Controller Area Network Segments through Wireless Sensor Network","authors":"S. Makka, B. B. Sagar","doi":"10.33832/ijsia.2019.13.4.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"8 1","pages":"1-12"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69499543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Financial Fraud Detection using Bio-Inspired Key Optimization and Machine Learning Technique 基于仿生密钥优化和机器学习技术的金融欺诈检测
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.08
A. Singh, Anurag Jain
{"title":"Financial Fraud Detection using Bio-Inspired Key Optimization and Machine Learning Technique","authors":"A. Singh, Anurag Jain","doi":"10.33832/ijsia.2019.13.4.08","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.08","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"75-90"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46967711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
BLAST: Blockchain Algorithm for Secure Transaction BLAST:区块链安全交易算法
International Journal of Security and Its Applications Pub Date : 2019-12-31 DOI: 10.33832/ijsia.2019.13.4.06
R. Johari, A. Parihar
{"title":"BLAST: Blockchain Algorithm for Secure Transaction","authors":"R. Johari, A. Parihar","doi":"10.33832/ijsia.2019.13.4.06","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.06","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"13 1","pages":"59-66"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49173077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信