Results 231 to 240 of about 1,764,419 (291)

Strengthening disaster preparedness and health security in Niger state, Nigeria through a WHO STAR-based multi-hazard risk assessment. [PDF]

open access: yesSci Rep
Awoyale OD   +14 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Assessing security assessment

1988., IEEE International Symposium on Circuits and Systems, 2003
The authors discuss aspect-operator-test graphs, a method for representing and evaluating engineering tasks, and apply them to power system security assessment. The result indicates where research is most needed. An analysis of existing practices for short-term security assessment shows that their greatest weakness is their complete lack of clearly ...
S.N. Talukdar, R.D. Christie
openaire   +1 more source

A.C. security assessment

Proceedings of the Institution of Electrical Engineers, 1975
The analysis of security assessment has evolved from load-flow techniques to evaluate system response for credible outages of transmission and generating plant or loss of loads. The a.c. security assessment described, based on a decoupled load flow, provides a better insight into the state of the system than does the conventional d.c.
F.G. Vervloet, A. Brameller
openaire   +1 more source

Metric Based Security Assessment

2004
This chapter introduces the Metrics Based Security Assessment (MBSA) as a means of measuring an organization’s information security maturity. It argues that the historical (i.e., first through third generations) approaches used to assess/ensure system security are not effective and thereby combines the strengths of two industry proven information ...
James E. Goldman, Vaughn R. Christie
openaire   +1 more source

Secure Blockchain: Assessing Specific Security Threats

2021
Blockchain technology originates from the Bitcoin system, and due to its great success it can draw awareness to other fields because of its global acceptable features like decentralization, anonymity, and audibility. Other than finance, blockchain technology has evolved in various applications like legal, supply chain, health care, etc.
Ganguly Ananya   +3 more
openaire   +1 more source

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi, Robert Wallace
exaly  

National Security Assessment

Abstract Chapter 2 discusses the application of a national security standard in merger review. It argues that even if this concept is not well-defined, it is commonly used to shape regulations seeking to address concerns arising from foreign investment.
openaire   +1 more source

Home - About - Disclaimer - Privacy