Results 51 to 60 of about 810,462 (294)

Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats

open access: yes, 2019
Advanced persistent threats (APTs) are stealthy attacks which make use of social engineering and deception to give adversaries insider access to networked systems.
barrett   +6 more
core   +1 more source

The Fate (Outcome) of Clinically Apparent Single Lesion and Oligofocal Nephroblastomatosis Treated According to SIOP/GPOH Protocols for Wilms Tumor

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The management of clinically apparent single lesions or oligofocal nephroblastomatosis, a facultative precursor of nephroblastoma, remains debated. Methods We retrospectively analyzed 37 patients with clinically apparent single or oligofocal nephroblastomatosis (two to three lesions per kidney) among 2347 patients registered between
Nils Welter   +17 more
wiley   +1 more source

Hospitals, health and death in Gaza

open access: yesSocial Medicine, 2023
Human rights violations harm dignity and inflict suffering by causing loss of health and/or life.  Thus, illness and death are the most tangible and irrefutable evidence of the commission of these crimes.
Marcos Arana-Cedeño
doaj  

Universidade: Questionar para Defender

open access: yesAdministração: Ensino e Pesquisa, 2022
A universidade é um mundo demasiadamente grande para caber em qualquer análise, muito menos nesta aqui tão incipiente, apenas sugestiva e que corre riscos de generalizar em demasia.
Pedro Demo
doaj   +1 more source

‘They Need to Hear You Say It’: Healthcare Professionals’ Perspectives on Barriers and Enablers to End‐of‐Life Discussions With Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT End‐of‐life conversations with adolescents and young adults (AYAs) with cancer rarely occur without the guidance of healthcare professionals. As a part of the ‘Difficult Discussions’ study, focused on palliative care and advance care planning discussions with AYAs with cancer, we investigated the factors that healthcare professionals identify ...
Justine Lee   +9 more
wiley   +1 more source

Anatomic - morphological features of qualified water polo players depending on game role

open access: yesPedagogics, Psychology, Medical-Biological Problems of Physical Training and Sports, 2014
Purpose : to analyze the anatomic - morphological features of qualified water polo players depending on game role. Material : the study group consisted of 41 athlete.
O. V. Poproshaev, O. V. Chumakov
doaj   +1 more source

Feasibility and Preliminary Efficacy of Integrative Neuromuscular Training for Childhood Cancer Survivors: A Pilot Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Survivors of childhood acute lymphoblastic leukemia (ALL) often exhibit early deficits in muscle and movement competence, which can compromise long‐term health. Integrative neuromuscular training (INT), a multifaceted approach combining fundamental movement activities with strength exercises, may help address these deficits during ...
Anna Maria Markarian   +7 more
wiley   +1 more source

Defender self-efficacy and moral disengagement on social support and bystander behaviors among primary school students: a multilevel moderated mediation model

open access: yesPsicologia: Reflexão e Crítica, 2023
This study examines the influence of social support on bystander behaviors, the mediating and moderating effects of moral disengagement and defender self-efficacy at the individual and class levels, and their cross-level interaction.
Yuping Wu, Yanfang Zhou, Leishan Shi
doaj   +1 more source

An Essay on the New Public Defender for the 21st Century [PDF]

open access: yes, 1995
Funding for public defender services is woefully inadequate.
Ogletree, Charles J., Jr.
core   +1 more source

A Polynomial Time Algorithm for Spatio-Temporal Security Games

open access: yes, 2017
An ever-important issue is protecting infrastructure and other valuable targets from a range of threats from vandalism to theft to piracy to terrorism. The "defender" can rarely afford the needed resources for a 100% protection. Thus, the key question is,
Ahmadinejad AmirMahdi   +8 more
core   +1 more source

Home - About - Disclaimer - Privacy