Results 41 to 50 of about 2,451,002 (323)
Social Engineering Resistant 2FA [PDF]
Attackers increasingly, and with high success rates, use social engineering techniques to circumvent second factor authentication (2FA) technologies, compromise user accounts and sidestep fraud detection technologies. We introduce a social engineering resistant approach that we term device-aware 2FA, to replace the use of traditional security codes.
arxiv
Income of the Aged Chartbook, 2006 [PDF]
This biennial companion to Income of the Population 55 or Older highlights selected data in charts and tables that are easy to understand. The charts focus on the receipt and shares of income from Social Security, pensions, assets, earnings, and public ...
Social Security Administration
core +1 more source
Development of 4T1 breast cancer mouse model system for preclinical carbonic anhydrase IX studies
Carbonic anhydrase IX (CAIX) is a well‐recognised therapeutic target and prognostic biomarker in cancer. We developed and characterised a robust murine breast cancer model system that is suitable for CAIX studies in vitro and in vivo—it comprises both CAIX‐positive and CAIX‐negative controls and provides a solid platform for the comprehensive ...
Zane Kalniņa+13 more
wiley +1 more source
Income of the Aged Chartbook, 2004 [PDF]
This biennial companion to Income of the Population 55 or Older highlights selected data in charts and tables that are easy to understand. The charts focus on the receipt and shares of income from Social Security, pensions, assets, earnings, and public ...
Social Security Administration
core +1 more source
Crime Against History: Slavery, Race, and the 1776 Report
ABSTRACT With the 2025 executive order, “Ending Radical Indoctrination in K‐12 Schooling,” the Trump administration reestablished the 1776 Commission, which produced The 1776 Report. This article argues that this report, which is an unsubtle response to The 1619 Project, reveals how White Christian Nationalists wish to mandate that a hyper‐patriotic ...
William V. Trollinger
wiley +1 more source
Obesity and metabolically healthy obesity: a review
Obesity is an independent risk factor for the development of chronic degenerative diseases. However, since the 80s, it has been observed that some people, despite being obese, exhibit a metabolic profile similar to that of a person of normal weight ...
Francisco G. Morales-Gurrola+2 more
doaj +1 more source
Income of the Aged Chartbook, 1998 [PDF]
This biennial companion to Income of the Population 55 or Older highlights selected data in charts and tables that are easy to understand. The charts focus on the receipt and shares of income from Social Security, pensions, assets, earnings, and public ...
Social Security Administration
core +1 more source
Abstract Purpose To investigate the feasibility of adapting a commercial prostate biopsy system for transrectal ultrasound (TRUS)‐guided hybrid gynecological (GYN) high‐dose‐rate (HDR) brachytherapy (BT). Leveraging 3D‐TRUS and MR image fusion, the prototype system aims to improve real‐time needle placement accuracy.
Lindsey H. Bloom+8 more
wiley +1 more source
Security Analysis on Social Media Networks via STRIDE Model [PDF]
Security associated threats are often increased for online social media during a pandemic, such as COVID-19, along with changes in a work environment. For example, employees in many companies and organizations have started to work from home due to the COVID-19 pandemic. Such working style has increased many remote activities and further relied on email
arxiv
Social Security Programs Throughout the World: Europe, 2008 [PDF]
[Excerpt] This first issue in the current four-volume series of Social Security Programs Throughout the World reports on the countries of Europe. The combined findings of this series, which also includes volumes on Asia and the Pacific, Africa, and the ...
Social Security Administration
core +1 more source