Results 51 to 60 of about 39,171 (196)
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks [PDF]
Despite the fact that cyberattacks are constantly growing in complexity, the research community still lacks effective tools to easily monitor and understand them.
Shen, Yun, Stringhini, Gianluca
core
Chiral Vortical and Magnetic Effects in Anomalous Hydrodynamics
We employ a 3+1D anomalous hydrodynamics with initial condition generated by HIJING to simulate the chiral vortical effect and the chiral magnetic effect in heavy-ion collisions.
Deng, Wei-Tian +4 more
core +1 more source
OS diversity for intrusion tolerance: Myth or reality? [PDF]
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity.
Bessani, A. N. +4 more
core +2 more sources
The Economic Burden of Metabolic Syndrome in Elective Surgery: An Australian Cost‐of‐Illness Study
ABSTRACT Background Metabolic syndrome (MetS) is common in elective surgical populations and is associated with increased postoperative complications. The national economic burden of MetS‐attributable surgical morbidity in Australia has not been quantified.
Philip Norris +7 more
wiley +1 more source
Globally, more than 85% of youth use social media daily in the medium of Facebook, Youtube, Twitter, etc., which is more than 70% for Bangladesh. The young population of Bangladesh is rapidly embracing social media through the internet and afflicted with
Sajid Amit +2 more
doaj +1 more source
The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities [PDF]
In spite of the growing importance of software security and the industry demand for more cyber security expertise in the workforce, the effect of security education and experience on the ability to assess complex software security problems has only been ...
Allodi, Luca +3 more
core +2 more sources
ABSTRACT Focused Question What is the association of periodontal disease (PerioD) and cardiovascular diseases (CVD/CVE) as reported in existing systematic reviews (SRs)? Methods MEDLINE‐PubMed and Cochrane‐CENTRAL databases were searched. Papers that primarily evaluate cardiovascular parameters of CVD and CVE in PerioD patients compared to non‐PerioD ...
Max G. P. Schoenmakers +4 more
wiley +1 more source
ABSTRACT The objectives of this study were to evaluate ATIP pharmacokinetics (PK) in healthy Beagle dogs after IM and IN dosing (Phase I), and to compare the rate of reversal of IM versus IN routes for xylazine (XYL) sedation (Phase II). This study was comprised of two sequential, randomized, crossover experiments. The initial PK study dosed ATIP by IN
Vanessa E. Cowan +7 more
wiley +1 more source
This chapter examines recent attempts to apply evolving ideas regarding women’s empowerment, leadership, and participation to the issue of preventing and countering violence extremism (P/CVE). Incorporation of the central tenants of the women, peace, and security agenda in the UN Security Council Resolution on P/CVE and the 2016 Global Strategy for ...
Eddyono, SW, Davies, SE
openaire +2 more sources
Hot water extract of Chlorella vulgaris (CVE) is a biologically substance that enhances organism’s immune function and antioxidative capacity. This study evaluated the effect of supplementation with various concentrations of CVE on muscle nutritional ...
Dan Zhang +10 more
doaj +1 more source

