Results 1 to 10 of about 2,383,360 (354)

Denial of information to the officer of the communal militia, police and security services: Between punishment and non-punishment [PDF]

open access: yesPravni Zapisi, 2022
The paper is dealing with authorities of the comunal militia, police and security services to collect information from citizens and legal persons. While the authorities of police and security services are based on willingness of giving information, at ...
Milosavljević Bogoljub
doaj   +1 more source

Impact of prior SARS-CoV-2 infection and COVID-19 vaccination on the subsequent incidence of COVID-19: a multicentre prospective cohort study among UK healthcare workers – the SIREN (Sarscov2 Immunity & REinfection EvaluatioN) study protocol

open access: yesBMJ Open, 2022
Introduction Understanding the effectiveness and durability of protection against SARS-CoV-2 infection conferred by previous infection and COVID-19 is essential to inform ongoing management of the pandemic. This study aims to determine whether prior SARS-
Nick Andrews   +21 more
doaj   +1 more source

A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base

open access: yesSensors, 2022
In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provided by
Qi Guo, Man Li, Weilin Wang, Ying Liu
doaj   +1 more source

PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction

open access: yesIEEE Access, 2020
As businesses embrace digitization, the Internet of Everything (IoE) begins to take shape and the Cloud continues to empower new innovations for big data -at the heart, Cloud analytic applications gain increasing momentum.
Marwa A. Elsayed, Mohammad Zulkernine
doaj   +1 more source

Characterization of the Infant Immune System and the Influence and Immunogenicity of BCG Vaccination in Infant and Adult Rhesus Macaques

open access: yesFrontiers in Immunology, 2021
In many countries where tuberculosis (TB) is endemic, the Bacillus Calmette–Guérin (BCG) vaccine is given as close to birth as possible to protect infants and children from severe forms of TB.
Charlotte Sarfas   +9 more
doaj   +1 more source

BIBLICAL IMAGES-SYMBOLS IN FRANK PERETTI’S MYSTICAL THRILLERS: LINGUAL REPRESENTATION AND PRAGMATIC VALUE [PDF]

open access: yesВісник університету ім. А. Нобеля. Серія Філологічні науки, 2023
The paper aims to clarify the biblical image-symbols in Frank Peretti’s mystical thrillers. The problem of the detailed analysis of the lingual representation of the biblical image-symbols and their pragmatic value is solved in the article by applying ...
Polina S. Khabotniakova   +1 more
doaj   +1 more source

Collection and Use of Information by Counter-Intelligence in the Context of Human Rights Protection

open access: yesAge of Human Rights Journal, 2022
Obtaining complete and reliable information during counter-intelligence activities is very critical. The extraction, analytical processing, and use of information regarding signs and facts of intelligence, terroristic, and other activities of special ...
Antonina Dimich   +4 more
doaj   +1 more source

CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews

open access: yesFuture Internet, 2020
To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions.
Franklin Tchakounté   +3 more
doaj   +1 more source

Critical appraisal in rapid systematic reviews of COVID-19 studies: implementation of the Quality Criteria Checklist (QCC)

open access: yesSystematic Reviews, 2023
In this letter, we briefly describe how we selected and implemented the quality criteria checklist (QCC) as a critical appraisal tool in rapid systematic reviews conducted to inform public health advice, guidance and policy during the COVID-19 pandemic ...
Daphne Duval   +5 more
doaj   +1 more source

Secure OM2M Service Platform [PDF]

open access: yes2015 IEEE International Conference on Autonomic Computing, 2015
Machine-to-Machine (M2M) paradigm is one of the main concern of Internet of Things (IoT). Its scope is to interconnect billions of heterogeneous devices able to interact in various application domains. Since M2M suffers from a high vertical fragmentation of current M2M markets and lacks of standards, the European Telecommunications Standards Institute (
Sicari, Sabrina   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy