Results 31 to 40 of about 48,460 (203)
Dental general anaesthetic receipt among Australians aged 15+ years, 1998–1999 to 2004–2005
Background Adults receive dental general anaesthetic (DGA) care when standard dental treatment is not possible. Receipt of DGA care is resource-intensive and not without risk.
Roberts-Thomson Kaye F, Jamieson Lisa M
doaj +1 more source
An Evaluation of DGA Classifiers [PDF]
Domain Generation Algorithms (DGAs) are a popular technique used by contemporary malware for command-and-control (C&C) purposes. Such malware utilizes DGAs to create a set of domain names that, when resolved, provide information necessary to establish a link to a C&C server.
Sivaguru, R. +5 more
openaire +3 more sources
Relatório de Progresso da Implementação do PANA II - ANO 2005 [PDF]
O presente relatório diz respeito a implementação do Segundo Plano de Acção Nacional para o Ambiente – PANA II, referente ao ano de 2005, com a seguinte estrutura: Introdução, Enquadramento, Estado da execução, Balanço Orçamental e ...
DGA, Coordenação
core +3 more sources
Command and control (C2) servers are used by attackers to operate communications. To perform attacks, attackers usually employee the Domain Generation Algorithm (DGA), with which to confirm rendezvous points to their C2 servers by generating various ...
Fangli Ren +3 more
doaj +1 more source
Hardening DGA Classifiers Utilizing IVAP [PDF]
Domain Generation Algorithms (DGAs) are used by malware to generate a deterministic set of domains, usually by utilizing a pseudo-random seed. A malicious botmaster can establish connections between their command-and-control center (C&C) and any malware-infected machines by registering domains that will be DGA-generated given a specific seed, rendering
Grumer, Charles +4 more
openaire +2 more sources
Global transcriptional profiling of tyramine and d-glucuronic acid catabolism in Salmonella
Salmonella has evolved various metabolic pathways to scavenge energy from the metabolic byproducts of the host gut microbiota, however, the precise metabolic byproducts and pathways utilized by Salmonella remain elusive.
Raquel Burin, Devendra H. Shah
doaj +1 more source
Analyzing spatial data from mouse tracker methodology: An entropic approach [PDF]
Mouse tracker methodology has recently been advocated to explore the motor components of the cognitive dynamics involved in experimental tasks like categorization, decision-making, and language comprehension.
A Calcagnì +58 more
core +1 more source
Filtrations on the knot contact homology of transverse knots
We construct a new invariant of transverse links in the standard contact structure on R^3. This invariant is a doubly filtered version of the knot contact homology differential graded algebra (DGA) of the link. Here the knot contact homology of a link in
John Etnyre +11 more
core +1 more source
A topological introduction to knot contact homology [PDF]
This is a survey of knot contact homology, with an emphasis on topological, algebraic, and combinatorial aspects.Comment: 38 pages, based on lectures at the Contact and Symplectic Topology Summer School in Budapest, July 2012; v2: fixed typos, updated ...
Ng, Lenhard
core +1 more source
Non-typhoidal Salmonella ingeniously scavenges energy for growth from tyramine (TYR) and d-glucuronic acid (DGA), both of which occur in the host as the metabolic byproducts of the gut microbial metabolism. A critical first step in energy scavenging from
Raquel Burin, Devendra H. Shah
doaj +1 more source

