Results 201 to 210 of about 271,704 (247)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Science, 2021
New variants have changed the face of the pandemic. What will the virus do next?
openaire +2 more sources
New variants have changed the face of the pandemic. What will the virus do next?
openaire +2 more sources
2022
The threat of attacks using chemical, biological, radiological, or nuclear means (CBRN) describe some of the most extreme possible events in a scenario of conflict. This chapter focuses on chemical (C) threats, where chemical agents are intended to cause a toxic effect on human organisms and where our definition of toxicity excludes those related to ...
Hassard, J.F., Nieuwenhuizen, M.S.
openaire +2 more sources
The threat of attacks using chemical, biological, radiological, or nuclear means (CBRN) describe some of the most extreme possible events in a scenario of conflict. This chapter focuses on chemical (C) threats, where chemical agents are intended to cause a toxic effect on human organisms and where our definition of toxicity excludes those related to ...
Hassard, J.F., Nieuwenhuizen, M.S.
openaire +2 more sources
Threats, Counter-Threats, and Strategic Voting
Econometrica, 1976This paper seeks to prove that under a large class of group decision rules some sincere voting situations will be unstable because of strategic manipulation by single individuals. The concept of stability used is weaker than the stability concepts figuring in many earlier contributions in this area, insofar as under the concept used here any individual,
openaire +2 more sources
2019
This chapter develops models for the unified analysis of security vulnerabilities and safety hazards that constitute various forms of threats to security and safety. A unified view of threats leads to understand that these threats can come from design flaws and faults at many levels of abstraction: application, architecture, or device. A unified threat
Marilyn Wolf, Dimitrios Serpanos
openaire +1 more source
This chapter develops models for the unified analysis of security vulnerabilities and safety hazards that constitute various forms of threats to security and safety. A unified view of threats leads to understand that these threats can come from design flaws and faults at many levels of abstraction: application, architecture, or device. A unified threat
Marilyn Wolf, Dimitrios Serpanos
openaire +1 more source

