Results 1 to 10 of about 7,114,774 (349)
Research on tor-based anonymous DDoS attack [PDF]
Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this attack is very difficult to trace due to the strong anonymity of Tor. Through conducting experiments in different network environment and making analyzation of security, the ...
Wang Rui +4 more
doaj +1 more source
The development of new therapies against SARS-CoV-2 is required to extend the toolkit of intervention strategies to combat the global pandemic. In this study, hyperimmune plasma from sheep immunised with whole spike SARS-CoV-2 recombinant protein has ...
Stephen Findlay-Wilson +23 more
doaj +1 more source
Vaccine effectiveness of a ChAdOx1-S booster was estimated in a test-negative case-control study in England. Protection was found to be moderate against mild disease but remained high and comparable to that of an mRNA booster against hospitalisation with
Freja Cordelia Møller Kirsebom +5 more
doaj +1 more source
This chapter first defines the concept of economic security and goes on to identify the main concerns of the EU and Asia in this domain. It explains why Asia cannot be apprehended as a homogenous block and provides a taxonomy of the Asian economies according to their specificities in order to compare their approach to economic security to the EU’s.
Defraigne, Jean-Christophe +1 more
openaire +4 more sources
The State of Food Security and Nutrition in the World 2020
Five years into the 2030 Agenda, it is time to assess progress and to question whether continuing efforts implemented thus far will allow countries to reach SDG 2 targets.
D. Missing
semanticscholar +1 more source
Statistical Security for Social Security [PDF]
Abstract The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration’s (SSA’s) forecasting procedures, which until now has been ...
Soneji, Samir, King, Gary
openaire +3 more sources
Computer security and security technologies [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information.
Lazar Stošić, Dragan Veličković
openaire +2 more sources
SARS-CoV-2 variants of concern have been associated with reduced vaccine effectiveness, even after a booster dose. In this study, authors aim to estimate vaccine effectiveness against hospitalisation with the Omicron and Delta variants, using different ...
Julia Stowe +4 more
doaj +1 more source
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou +3 more
doaj +1 more source
A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou +6 more
doaj +2 more sources

