help me understand how we can assese the cureent state of cybersecurity globally?
what are the key facilitators of cybersecurity vulnerabilities globaly?
Here are three examples of sector-specific reviews of cybersecurity:
1. https://content.iospress.com/articles/technology-and-health-care/thc1263
2. http://www.tandfonline.com/doi/abs/10.1080/23742917.2016.1252211
3. http://ieeexplore.ieee.org/abstract/document/8088163
There are some reports about the level of cybersecurity of state level. I remember there was a publication from RAND Europe, ASPI, BSA Software Alliance, and so forth.
Hello. I have a skewed elliptical coordinate system (I use alternative elliptical coordinates). And I need to determine connections between coordinates in order to fetch a covariance matrix of...
28 February 2021 364 3 View
Hello fellow researchers, I recently have a problem with an HPLC coupled to an Orbitrap mass analyzer. I usually use some protein mix to make sure the equipment is ready to separate and read...
09 February 2021 3,595 8 View
In my research related to monitoring the cow behavior with help of sensors I have a permanent and principal problem with the data for model validation. I tried to find some available open-source...
26 December 2020 8,197 2 View
Hello, For a project which studies how teens deal with social media and their interfaces, I'm interested in so-called "activity theory" (also know as cultural-historical activity theory). I know...
21 October 2020 2,364 4 View
Hi everyone! Does anybody know about a good website or place to get some guidance on Northern blotting? Also, advice on blotting the RNA ladder?
07 October 2020 739 3 View
I am trying to design a vector as compact as posible to test DNA transcriptional enhancer and/or repressor activity, I already have a compact bacbone (pICOz vector), minimal promoter, translation...
22 August 2020 1,083 1 View
Hi everybody! I need to amplify phage DNA so as to be able to produce restriction profiles using different restriction endonucleases. Can anyone recommend which primers should I use? I know random...
06 August 2020 1,194 3 View
My current research is about SPC and I'm interested in tuning strategies for these types of predictive control approaches. The cost function is on the photo and the tuning parameters are Np...
23 July 2020 1,176 1 View
On the role of aluminum in TWIP steels
22 July 2020 5,670 4 View
There are some theories, as Pelgrum and Law (2003) suggested that it is necessary to make a switch between the teacher and the student roles. I mean, the student should be also the active role in...
15 July 2020 5,169 15 View
With emerging technologies, the availability of data at every point of customer interaction has increased. Consequently, the need to monitor and secure the data has increased. With data being...
19 January 2021 7,944 9 View
I'm searching a (free) software that simulates the effect of strong wind on the vulnerability a tree.
15 December 2020 8,119 3 View
In conducting a Climate Change Vulnerability Assessment at the household level using a survey questionnaire, there is a need to ask participants how they characterize their experience of various...
17 November 2020 1,544 1 View
I am looking for sources on this subject, books, magazines, or academic researches concerned with the topic of cybersecurity and the competition between China and America in this field.
11 November 2020 6,976 3 View
ROC/AUC Vulnerability Groundwater Machine learning
11 October 2020 9,186 3 View
Underlying health conditions that play a role in increasing vulnerability to coronaviruses and risks of higher mortality among young adults and children
13 September 2020 7,107 7 View
Handling imbalanced datasets in machine learning is a difficult challenge, and can include topics such as payment fraud, diagnosing cancer or disease, and even cybersecurity attacks. How to...
28 July 2020 412 14 View
Currently l am thinking of perusing research computing, ideal area cybersecurity problems and IoT, so far proposed research title "security risk assessment in IoT systems: Data privacy and...
14 July 2020 364 22 View
21 June 2020 7,141 5 View
Risk and vulnerability equations, Data analyzing using vulnerability equations in SPSS or Arc GIS, Exposure , sensitivity and adaptive capacity in livelihood vulnerability assessment
15 June 2020 851 1 View