Results 21 to 30 of about 1,804,817 (300)

Tolerance and Persistence of Ebola Virus in Primary Cells from Mops condylurus, a Potential Ebola Virus Reservoir

open access: yesViruses, 2021
Although there have been documented Ebola virus disease outbreaks for more than 40 years, the natural reservoir host has not been identified. Recent studies provide evidence that the Angolan free-tailed bat (Mops condylurus), an insectivorous microbat ...
Marcel Bokelmann   +11 more
doaj   +1 more source

Looming Threats to Society Journals [PDF]

open access: yes, 2006
Now is not the time for members of professional scientific societies to be complacent or unengaged. The American Chemical Society Publications Division, as well as other learned society publishers, such as the Royal Society of Chemistry, may be overly ...
Douglas, Kimberly, Roth, Dana L.
core   +1 more source

Gut bacterial consortium enriched in a biofloc system protects shrimp against Vibrio parahaemolyticus infection

open access: yesMicrobiome, 2023
Background Shrimp cultured in a biofloc system (BFS) have a lower disease incidence than those farmed in a water exchange system (WES). Although a number of studies have reported that the gut bacterial community induced by BFS is highly associated with ...
Haipeng Guo   +8 more
doaj   +1 more source

Human Security: Undermining Human Rights? [PDF]

open access: yes, 2012
This article warns that the human security discourse and agenda could inadvertently undermine the international human rights regime. Insofar as human security identifies new threats to well-being, new victims of those threats, new duties of states, or ...
Howard-Hassmann, Rhoda E.
core   +3 more sources

A log mining approach for process monitoring in SCADA [PDF]

open access: yes, 2012
SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when
Bolzoni, Damiano   +2 more
core   +11 more sources

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

UK energy security: challenges, threats and solutions [PDF]

open access: yes, 2011
Over the last few decades, the debate about 'Peak Oil' became increasingly common and frustrating to governments, oil companies and individuals. Also in the last decade or so, some unusual events took places, which have raised the concern about the ...
Abdo, H
core   +2 more sources

Dynamic threat processing [PDF]

open access: yesJournal of Cognitive Neuroscience, 2017
AbstractDuring real-life situations, multiple factors interact dynamically to determine threat level. In the current functional MRI study involving healthy adult human volunteers, we investigated interactions between proximity, direction (approach vs. retreat), and speed during a dynamic threat-of-shock paradigm.
Meyer, Christian   +2 more
openaire   +2 more sources

Cold stress tolerance of the intertidal red alga Neoporphyra haitanensis

open access: yesBMC Plant Biology, 2022
Background Red algae Porphyra sensu lato grow naturally in the unfavorable intertidal environment, in which they are exposed to substantial temperature fluctuations. The strategies of Porphyra to tolerate cold stress are poorly understood. Results Herein,
Shanshan Zhu   +9 more
doaj   +1 more source

Threats to Wetlands [PDF]

open access: yes
This resource presents a history of wetland loss and describes how wetlands are lost. It also stresses the consequences of wetland loss including flooding, loss of wildlife habitat, and declining water quality.

core   +1 more source

Home - About - Disclaimer - Privacy