Vulnerability Analysis of CSP Based on Stochastic Game Theory
With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial ...
Jiajun Shen, Dongqin Feng
doaj +1 more source
An integrated modeling, verification, and code generation for uncrewed aerial systems: less cost and more efficiency [PDF]
Uncrewed Aerial Systems (UASs) are widely implemented in safety-critical fields such as industrial production, military operations, and disaster relief.
Jianyu Zhang +4 more
doaj +2 more sources
Poland’s defense preparations in the context of allied obligations. Legal, institutional, and instrumental aspects [PDF]
Poland’s accession to the North Atlantic Treaty Organization in 1999 was one of the most critical events in the Third Republic history. The integration process with NATO’s political and military structures is long-term and requires the constant ...
Marian Kuliczkowski
doaj +1 more source
The NPFIT strategy for information security of care record service [PDF]
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core
Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright +13 more
wiley +1 more source
The Role of Material Stocks in the National Security System
The article consists of two parts. The first part describes the essence of the national security system and its structure. Using the Ishikawa diagram and the value chain, the authors presented the shortcomings of the national security system and a ...
Paweł Ślaski, Małgorzata Grzelak
doaj +1 more source
Under the Radar: Muslims Deported, Detained, and Denied on Unsubstantiated Terrorism Allegations [PDF]
Through the targeted use of a wide set of immigration and law enforcement policies and actions, the U.S. government has cast Muslims as dangerous threats to national security, leaving Muslim communities across the United States vulnerable to ...
Amna Akbar +4 more
core
Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles +4 more
wiley +1 more source
INSTITUTIONAL STRATEGIES OF SYSTEM SECURITY OF TECHNOLOGICAL & INNOVATION SYSTEMS
The purpose of this study is to consider the main aspects of system security providing institutional concept within the technological & innovation systems research methodology development through institutional innovations. In this paper, we will consider
Vitaliy Omelyanenko
doaj +1 more source
Defining Roles in Pediatric Palliative Care: Perspectives From Oncology and Palliative Care Teams
ABSTRACT Background Early integration of pediatric palliative care (PPC) is associated with improved symptom management, quality of life, and healthcare utilization for children with cancer. Despite this, variation persists in how PPC is understood, operationalized, and integrated within pediatric oncology programs. In particular, ambiguity surrounding
Leeat Granek +13 more
wiley +1 more source

