Results 41 to 50 of about 360,424 (323)

Games of Threats [PDF]

open access: yesSSRN Electronic Journal, 2017
A game of threats on a finite set of players, N, is a function d that assigns a real number to any coalition, S ⊆ N, such that d(S) = -d(N\S). A game of threats is not necessarily a coalitional game as it may fail to satisfy the condition d(O) = 0. We show that analogs of the classic Shapley axioms for coalitional games determine a unique value for ...
Kohlberg, Elon, Neyman, Abraham
openaire   +4 more sources

Quantifying the econometric loss of a cyber-physical attack on a seaport

open access: yesFrontiers in Computer Science, 2023
Modern Cyber-Physical Systems (CPS) show increasing levels of automation, intelligence, and optimization capabilities. Both creators and adopters of these technologies emphasize the benefits: safety, cost-savings, and efficiencies.
Kimberly Tam   +4 more
doaj   +1 more source

The impact of frailty syndrome on skeletal muscle histology: preventive effects of exercise

open access: yesFEBS Open Bio, EarlyView.
Frailty syndrome exacerbates skeletal muscle degeneration via increased ECM deposition and myofiber loss. This study, using a murine model, demonstrates that endurance exercise attenuates these histopathological alterations, preserving muscle integrity. Findings support exercise as a viable strategy to counteract frailty‐induced musculoskeletal decline
Fujue Ji   +3 more
wiley   +1 more source

Selective replication and vertical transmission of Ebola virus in experimentally infected Angolan free-tailed bats

open access: yesNature Communications
The natural reservoir of Ebola virus (EBOV), agent of a zoonosis burdening several African countries, remains unidentified, albeit evidence points towards bats.
S. A. Riesle-Sbarbaro   +17 more
doaj   +1 more source

First Description of a Temperate Bacteriophage (vB_FhiM_KIRK) of Francisella hispaniensis Strain 3523

open access: yesViruses, 2021
Here we present the characterization of a Francisella bacteriophage (vB_FhiM_KIRK) including the morphology, the genome sequence and the induction of the prophage. The prophage sequence (FhaGI-1) has previously been identified in F.
Kristin Köppen   +5 more
doaj   +1 more source

Myocarditis associated with COVID-19 vaccination

open access: yesnpj Vaccines
Following the start of the COVID-19 vaccination campaign, the adverse events of myocarditis and pericarditis were linked mainly to mRNA COVID-19 vaccines by the regulatory authorities worldwide. COVID-19 vaccines have been administered to several million
Alessandra Buoninfante   +3 more
doaj   +1 more source

Cyanobacterial blooms in kaliski region water reservoirs and water quality parameters / Zakwity sinicowe w zbiornikach okolic Kalisza a wskaźniki jakości wody

open access: yesArchives of Environmental Protection, 2015
Zakwity sinicowe występują szczególnie często w zbiornikach małej retencji poddanych wielokierunkowej antropopresji. Obfitemu występowaniu sinic towarzyszy niebezpieczeństwo związane z zachwianiem równowagi tlenowej w środowisku wodnym oraz wydzielaniem ...
Szczukocki Dominik   +6 more
doaj   +1 more source

Defense for Advanced Persistent Threat with Inadvertent or Malicious Insider Threats [PDF]

open access: yesarXiv, 2022
In this paper, we propose a game-theoretical framework to investigate advanced persistent threat problems with two types of insider threats: malicious and inadvertent. Within this framework, a unified three-player game is established and Nash equilibria are obtained in response to different insiders.
arxiv  

Enhanced Fog Water Harvesting on Superhydrophobic Steel Meshes

open access: yesAdvanced Engineering Materials, EarlyView.
Fog harvesting using mesh designs offers a sustainable solution to water scarcity. This study highlights key considerations for fog harvesting research and develops a methodology for a standardized protocol reflecting fog characteristics and environmental conditions.
Pegah Sartipizadeh   +3 more
wiley   +1 more source

TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports [PDF]

open access: yesDigital Threats: Research and Practice (2024)
Understanding the modus operandi of adversaries aids organizations in employing efficient defensive strategies and sharing intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports.
arxiv   +1 more source

Home - About - Disclaimer - Privacy