-
Chapter and Conference Paper
Towards Human-Centric Endpoint Security
In a survey of six widely used end-to-end encrypted messaging applications, we consider the post-compromise recovery process from the perspective of what security audit functions, if any, are in place to detec...
-
Chapter and Conference Paper
Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures
How does one defend Cyber-Physical Systems (CPSs) in the face of changing security threats without continuous manual intervention? These systems form a critical part of national infrastructure and exist within...
-
Article
Open AccessImproving diabetic patients’ adherence to treatment and prevention of cardiovascular disease (Office Guidelines Applied to Practice—IMPACT Study)—a cluster randomized controlled effectiveness trial
Despite nationwide improvements in cardiovascular disease (CVD) mortality and morbidity, CVD deaths in adults with type 2 diabetes (T2DM) are 2–4 times higher than among those without T2DM. A key contributor t...
-
Chapter and Conference Paper
Building a Privacy Testbed: Use Cases and Design Considerations
Mobile application (app) developers are often ill-equipped to understand the privacy implications of their products and services, especially with the common practice of using third-party libraries to provide c...
-
Article
Open AccessComparing multiple statistical software for multiple-indicator, multiple-cause modeling: an application of gender disparity in adult cognitive functioning using MIDUS II dataset
The multiple-indicator, multiple-cause model (MIMIC) incorporates covariates of interest in the factor analysis. It is a special case of structural equation modeling (SEM), which is modeled under latent variab...
-
Article
Open AccessStudy of active neighborhoods in Detroit (StAND): study protocol for a natural experiment evaluating the health benefits of ecological restoration of parks
Individuals living in deprived inner cities have disproportionately high rates of cancers, Type 2 diabetes and obesity, which have stress- and physical inactivity-related etiologies. This study aims to quantif...
-
Chapter and Conference Paper
Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure
Industrial Control Systems (ICS) play an important role in the monitoring, control and automation of critical infrastructure such as water, gas, oil and electricity. Recent years have seen a number of high pr...
-
Article
Open AccessColonic polyp histopathology and location in a community-based sample of older adults
Colorectal cancer and its precursors are highly prevalent in developed countries. Estimates in the available literature for prevalence of right-sided-only lesions vary between 20.5 and 48.1 %, with association...
-
Chapter and Conference Paper
On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis
Malware attacks are increasingly popular attack vectors in online crime. As trends and anecdotal evidence show, preventing these attacks, regardless of their opportunistic or targeted nature, has proven diffic...
-
Article
Intra- and inter-individual variability of urinary phthalate metabolite concentrations in Hmong women of reproductive age
The reproducibility of urinary phthalate metabolite concentrations has not been well characterized in non-pregnant women of reproductive age. Our primary study objectives were to describe the distribution of u...