Results 31 to 40 of about 360,424 (323)
Background SARS-CoV-2 cases in Germany increased in early March 2020. By April 2020, cases among health care workers (HCW) were detected across departments at a tertiary care hospital in Berlin, prompting a longitudinal investigation to assess HCW SARS ...
Sara Tomczyk+11 more
doaj +1 more source
A systematic literature review on cyber threat hunting [PDF]
Since the term "Cyber threat hunting" was introduced in 2016, there have been a rising trend of proactive defensive measure to create more cyber security. This research will look into peer reviewed literature on the subject of cyber threat hunting.
arxiv
We analyze a simple stochastic environment in which policy makers can be threatened by “nasty” interest groups. In the absence of these groups, the policy maker’s desire for reelection guarantees that good policies are implemented for every realization of the shock. When pressure groups can harass the policy maker, good policies will be chosen for only
Rafael Di Tella+2 more
openaire +4 more sources
Cold stress tolerance of the intertidal red alga Neoporphyra haitanensis
Background Red algae Porphyra sensu lato grow naturally in the unfavorable intertidal environment, in which they are exposed to substantial temperature fluctuations. The strategies of Porphyra to tolerate cold stress are poorly understood. Results Herein,
Shanshan Zhu+9 more
doaj +1 more source
Sucrose is an effective carbon source for creating more reliable and environmentally friendly conditions for shrimp growth by regulating bacteria in biofloc-based culture systems.
Haipeng Guo+7 more
doaj +1 more source
Nitrite (NIT), a commonly used food additive, especially in pickled and cured vegetables and meat products, might cause acute and chronic diseases. Fermentation with lactic acid bacteria (LAB) is an effective method for degrading NIT and improving the ...
Chaoran Xia+6 more
doaj +1 more source
Privacy Threats on the Internet of Medical Things [PDF]
The Internet of Medical Things (IoMT) is a frequent target of attacks -- compromising both patient data and healthcare infra-structure. While privacy-enhanced technologies and services (PETS) are developed to mitigate traditional privacy concerns, they cannot be applied without identifying specific threat models. Therefore, our position is that the new
arxiv
Instructed threat enhances threat perception in faces.
Anxiety can boost the detection of potential threats in many ways. There is evidence that one and the same facial expression can be perceived differently depending on whether it is seen in a neutral or in a threatening situation. The present study investigated how aversive anticipation influences the accuracy of facial emotion recognition and the ...
Fatih C. Kavcıoğlu+3 more
openaire +3 more sources
Is the Hybrid Threat a True Threat?
Does the “hybrid threat” discussed in General Marty Dempsey’s 2015 United States National Military Strategy make logical sense? In this paper I define the national security threat risk assessment process, examine the most significant US security threats, and study the hybrid threat.
openaire +4 more sources
Co-option of a non-retroviral endogenous viral element in planthoppers
Non-retroviral endogenous viral elements (nrEVEs) are widely dispersed throughout the genomes of eukaryotes. Although nrEVEs are known to be involved in host antiviral immunity, it remains an open question whether they can be domesticated as functional ...
Hai-Jian Huang+18 more
doaj +1 more source