Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Threats"

ADD TO MY LIST
 
The Middle Eastern Biodiversity Network: Generating and sharing knowledge for ecosystem management and conservation

Author(s): Friedhelm Krupp | Maroof Khalaf | Masoumeh Malek | Bruno Streit | Masaa Al-Jumaily
A web-based platform to support text mining of clinical reports for public health surveillance

Author(s): Annie T. Chen | Wendy Chapman | Mike Conway | Brian Chapman
Using syndromic surveillance data to identify emerging trends in designer drug use

Author(s): Alise Brown | William Storm | Brian Fowler
Web search query data to monitor dengue epidemics: a new model for dengue surveillance

Author(s): Emily Chan | Vikram Sahai | Corrie Conrad | John Brownstein
Leveraging the ‘Wisdom of the Crowd’ as a biosurveillance tool

Author(s): Izchak Lichtenfeld | Limor Bar-Hai
User interface design for a biosurveillance system

Author(s): Andrew Wadsworth | Wendy Edwards | Awais Vaid | Ian Brooks
Science and technology enabling integrative global biosurveillance

Author(s): Helen Cui | Gary Resnick | Cathy Cleland
Analytic fusion of ESSENCE clinical evidence sources for routine decision support

Author(s): Howard Burkom | Yevgeniy Elbert | Liane Ramac-Thomas | Richard Seagraves | Chong Lee | Wayne Loschen | Kenneth Cox
Hierarchical filtering of ESSENCE for routine, distributed disease monitoring by the Veterans Health Administration

Author(s): Howard Burkom | Yevgeniy Elbert | Vivian Hung | Aaron Wendelboe | Chris Lee | Richard Wojcik | Patricia Schirmer | Cynthia Lucero | Mark Holodniy
Advantages of real time surveillance for outbreak detection and management

Author(s): Franck de Laval | Christian Boulais | Hervé Chaudet | Gaëtan Texier | Catherine Marchand | Louisa Atmani | Christophe Decam | René Migliani | Xavier Deparis | Jean Meynard
Novel approach to statewide biosurveillance using emergency medical services (EMS) information

Author(s): Charles Cairns | David Potenziani | Marc Hoit | Colleen Jenkins | Sam Edgemon
Impact of training on Disease Surveillance and Notification Officers in Nigeria

Author(s): Olawunmi Adeoye | Abimbola Aman-Oloniyo | Clement Nwaeke | Angela Mbata | Abiola Oduneye
Evaluating syndrome definitions in the extended syndromic surveillance ontology

Author(s): Mike Conway | John Dowling | Wendy Chapman
Ocorrência e conservação da anta Tapirus terrestris (Linnaeus, 1758) na Reserva Florestal do Morro Grande, SP, Brasil. Occurrence and conservation of Tapirus terrestris (Linnaeus, 1758) in Morro Grande Forestry Reserve, São Paulo state, Brazil.

Author(s): Gláucia Cortez Ramos de PAULA | Alexsander Zamorano ANTUNES | Frederico Alexandre Roccia Dal Pozzo ARZOLLA | Francisco Eduardo Silva Pinto VILELA | Marilda Rapp de ESTON
Effectiveness of Security Tools to Anomalies on Tunneled Traffic

Author(s): Nazrulazhar Bahaman | Anton Satria Prabuwono | Mohd Zaki Mas`ud | Mohd Faizal Abdollah
LANGUAGE METAMORPHOSES IN EXILE

Author(s): Anamaria Fălăuş
Discipline methods

Author(s): Maria Kikila | Ioannis Koutelekos
Handsets Malware Threats and Facing Techniques

Author(s): Marwa M. A. Elfattah | Aliaa A.A Youssif, | Ebada Sarhan Ahmed
Investigation for Cryptosporidium spp. oocysts of drinking water in Van

Author(s): Mutalip ÇİÇEK | Hanifi KÖRKOCA | Önder AKKAŞ
Reliability Issues in Open Source Software

Author(s): R. K. Pandey | Vinay Tiwari
Substrate Bioaugmentation of Waste Engine Oil Polluted Soil

Author(s): Beckley Ikhajiagbe | Geoffery Obinna Anoliefo
A review of Fuzzy Mechanismsfor Egovernment Security

Author(s): Nadir Omer FadlElssied | Othman Ibrahim | Adil Ali A.alaziz
A Comparison of Trojan Virus Behavior in Linux and Windows Operating System

Author(s): Ghossoon. M. W. Al-Saadoon | Hilal M.Y. Al-Bayatt
Hepatitis A surveillance evaluation in Mafraq Health Directorate, Jordan 2010

Author(s): Ghazi Sharkas | Sami Sheikh-ali | Sultan Abdulla
Risk factors for norovirus outbreaks associated with attack rate and genogroup

Author(s): Jamie Felzer | Jonathan Matthews | Ben Dickey | Rebecca Miller | Brad Dawson | Alice Lee | Jennifer Rocks | Christine Moe | Joe Eisenberg | Juan Leon
Use of syndromic surveillance in decision making during the H1N1 pandemic in Ontario, Canada

Author(s): Anna Chu | Rachel Savage | Natasha S. Crowcroft | Laura C. Rosella | Donald J. Willison | Ian Johnson
Use of CDC's epidemic information exchange system as a disease surveillance tool

Author(s): James Schwendinger | Eric Lahr | Jonathan Lynch | Molly McCollom | Amanda Evanson
Inferring travel from social media

Author(s): Alessio Signorini | Philip Polgreen | Alberto Segre
Crowdout: when do other events hinder informal disease surveillance?

Author(s): David Scales | Emily Chan | John Brownstein
Using cKASS to facilitate knowledge authoring and sharing for syndromic surveillance

Author(s): Liqin Wang | Mingyuan Zhang | Mike Conway | Peter Haug | Wendy Chapman
Distributing countermeasures for all hazards events and reporting their utilizations

Author(s): Michele Renshaw | Sanjeeb Sapkota | Stephanie Dulin | Guy Faler | Benjamin Erickson | Sarah Waite | Leslie Han | Caroline Westnedge | Jeanne Tropper | Barb Nichols
A conservation assessment of Rousettus madagascariensis (Grandidier, 1929, Pteropodidae) roosts in eastern Madagascar

Author(s): Radosoa A. Andrianaivoarivelo | Daudet Andriafidison | Christophe Rahaingonirina | Sylvèstre Raharimbola | Andrinajoro A. Rakotoarivelo | Olga R. Ramilijaona | Paul A. Racey | Richard K. B. Jenkins
Knowledge, attitudes and perceptions of health professionals in relation to A/H1N1 influenza and its vaccine

Author(s): Amanda López-Picado | Antxon Apiñaniz | Amaia Ramos | Erika Miranda-Serrano | Raquel Cobos | Naiara Parraza-Díez | Patricia Amezua | Mónica Martinez-Cengotitabengoa | Felipe Aizpuru
Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE)

Author(s): Basappa B. Kodada | Ramesh Nayak | Raghavendra Prabhu | Suresha D
Restoration and enhancement of Atlantic salmon populations: what we have learned from North Iberian rivers

Author(s): Horreo J.L. | De La Hoz J. | Machado-Schiaffino G. | Pola I.G. | Garcia-Vazquez E.
Climate Change and Security: The Case for Turkey

Author(s): Esra Pakin Albayrakoğlu
Security threats in Wireless Sensor Networks

Author(s): Sona Malhotra | Rahul Kadian
Approaches to Definition of Security of an Enterprise

Author(s): N. L. Gavkalova | Y. S. Chaplygina
Tax Security: Essence and Conditions of its Provision

Author(s): Yu. Ivanov | Yu. Berezhna
Fiscal Policy Restrictions on Inflation Targeting: A Political Economy Approach

Author(s): Hernando Vargas, | Yanneth Rocío Betancourt,
Optimism of health care workers during a disaster: a review of the literature

Author(s): Noga Boldor | Yosefa Bar-Dayan | Tova Rosenbloom | Joshua Shemer | Yaron Bar-Dayan
A SWOT Analysis of Persian Handmade Carpet Exports

Author(s): Seyed Fathollah Amiri Aghdaie | Hosein Zare Zardeini
Community participation and participative management in a community of Badajoz, Extremadura, Spain Participação Comunitária e Gestão Participativa em uma comunidade de Badajoz, Extremadura, Espanha

Author(s): Ana Carolina Diniz Oliveira | Ignacio Maynar Mariño | Maria Dolores Fernandez | Carmen Mata Benito | Jesús Cobaleda Gallardo
Effective Security Architecture for Virtualized Data Center Networks

Author(s): Udeze Chidiebele. C | Prof. H. C Inyiama | Okafor Kennedy .C | Dr C. C. Okezie
A Study on Cloud Security Issues and Challenges

Author(s): A. Mercy Gnana Rani1 | Dr.A.Marimuthu2
Intrusion Detection Systems in Wireless Sensor Networks

Author(s): Vijay Kumar Mallarapu | K.V.D.Sagar
Security Risks in IP Telephony

Author(s): Filip Rezac | Miroslav Voznak
IT Security Aspects of Industrial Control Systems

Author(s): Peter Holecko | Izabela Krbilova
Control of System with Defined Risk Level

Author(s): Pavol Tomasov | Martin Sutak
Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

Author(s): Filip Rezac | Miroslav Voznak | Karel Tomala | Jan Rozhon | Jiri Vychodil
A Novel Framework for Security Requirement Prioritization

Author(s): Shalini Sharma | Ajit Singh Malik
Farmers’ Agro forestry in Pakistan, Farmers’ Role-Trends and Attitudes

Author(s): Tanveer Hussain | Ghulam Sarwar Khan | Shahid Ali Khan | Nasir Masood | Muhammad Ashfaq | Naila Sarwer
Volcanic caves: priorities for conserving the Azorean endemic troglobiont species

Author(s): Borges Paulo A.V. | Cardoso Pedro | Amorim Isabel R. | Pereira Fernando | Constância João P. | Nunes João C. | Barcelos Paulo | Costa Paulino | Gabriel Rosalina | Dapkevicius Maria de Lurdes
Development of a Storm Surge Prediction Model

Author(s): Paul Rivera | Jorge Delas Alas
Tetanus seropositive prevalence and perceived protection from emergency admissions

Author(s): Marcus A. Moore | Kimberly R. Barber | Todd Britt
Cyber Threats In Social Networking Websites

Author(s): Wajeb Ghari | Maha Shaabi
Bluetooth Security Threats And Solutions: A Survey

Author(s): Nateq Be-Nazir Ibn Minar | Mohammed Tarique
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots

Author(s): K.Munivara Prasad | A.Rama Mohan Reddy | V Jyothsna
GIS-based coastal area suitability assessment of geo-environmental factors in Laoshan district, Qingdao

Author(s): C. Y. Ju | Y. G. Jia | H. X. Shan | C. W. Tang | W. J. Ma
RISK MANAGEMENT MEASURES IN CMMI

Author(s): Mahmoud Khraiwesh
Logistic support provided to Australian disaster medical assistance teams: results of a national survey of team members

Author(s): Peter Aitken | Peter Leggat | Hazel Harley | Richard Speare | Muriel Leclercq
Sustainability Management Based Approach to Global Warming:

Author(s): AYSE KUCUK YILMAZ | Hikmet KARAKOC
National Strategies of Ophthalmic Education in Iran

Author(s): A Entezari | MA Javadi | B Einollahi
MAIN THREATS TO THE ROMANIAN LABOUR MARKET IN THE CURRENT CONTEXT

Author(s): DIMIAN Gina Cristina | DIMIAN Mihai
AUDITOR ROTATION - A CRITICAL AND COMPARATIVE ANALYSIS

Author(s): Mocanu Mihaela | Stefanescu Aurelia | Turlea Eugeniu
INTERNAL ENVIRONMENT ANALYSIS TECHNIQUES

Author(s): Caescu Stefan Claudiu | Popescu Andrei | Ploesteanu Mara Gabriela
Associations of Conifer-Infesting Bark Beetles and Fungi in Fennoscandia

Author(s): Riikka Linnakoski | Z. Wilhelm de Beer | Pekka Niemelä | Michael J. Wingfield
Atlantic hurricanes and associated insurance loss potentials in future climate scenarios: limitations of high-resolution AGCM simulations

Author(s): Christoph C. Raible | Sabine Kleppek | Marc Wüest | David N. Bresch | Akio Kitoh | Hiroyuki Murakami | Thomas F. Stocker
CSRF Vulnerabilities and Defensive Techniques

Author(s): Rupali D. Kombade | B.B. Meshram
Handset Malwares Threats Feature Extraction Based on Behavior Analysis

Author(s): Marwa M. A. Efattah | Aliaa A. A. Youssif | Ebada Sarhan Ahmed
The current distribution in Poland of some European neophytic bryophytes with supposed invasive tendencies

Author(s): Ewa Fudali | Mirosław Szczepański | Anna Rusińska | Stanisław Rosadziński | Grzegorz Wolski
DIFFERENT SECURITY MECHANISMS FOR DIFFERENT TYPE OF SECURITY LAPSES IN WMN- A REVIEW

Author(s): Narender Singh | Kuldeep Vats | Jasvinder | Lovish Jaiswal
UNAPPROVED ACCESS POINT ELIMINATION IN WLAN USING MULTIPLE AGENTS AND SKEW INTERVALS

Author(s): Prof.S.B.Vanjale | J.A.Dave | Prof.P.B.Mane
TRACKING OF INTRUDERS ON GEOGRAPHICAL MAP USING IDS ALERT

Author(s): Manish Kumar | M. Hanumanthappa | T.V. Suresh Kumar
Collective and Personal Annihilation Anxiety: Measuring Annihilation Anxiety AA

Author(s): Bulent Ozkan | Jamal Mohanesh | Abdulkhaleq Hussam | Vidya Ramaswamy | Ibrahim A. Kira | Thomas Templin | Linda Lewandowski
Personnel Security outside the Box

Author(s): Sergey Yesin | Semyon Ioffe
Personnel Security outside the Box

Author(s): Sergey Yesin | Semyon Ioffe
Anti-Bacterial Activity of Three Species of Sea Urchin Extracts from Pulau Bidong, Terengganu

Author(s): Shamsuddin, A. A. Lukman Hakim, M. D.Kumari, G. M., and Noraznawati, I.
Habitat Ecology of Himalayan Musk Deer (Moschus chrysogaster) in Manaslu Conservation Area, Nepal

Author(s): Ashok Subedi | Achyut Aryal | Raj Kumar Koirala | Yajna Prasad Timilsina | Xiuxiang Meng | Fiona McKenzie
Biodiversity Conservation through Traditional Beliefs System: A Case Study from Kumaon Himalayas, India

Author(s): Harsh SINGH | Tariq HUSAIN | Priyanka AGNIHOTRI | Puran Chandra PANDE | Mudassar IQBAL
ONLINE EDUCATION - AN IMPORTANT ISSUE FOR THE LABOR MARKET

Author(s): Diana-Mihaela POCIOVĂLIŞTEANU | Liana BADEA
Overview of Fraud Prevention & Management

Author(s): Rashmi G.Dukhi | Sandhya Dahake
Novel Approach for Worm Detection using Modified CRC32 Algorithm

Author(s): Avinash Wadhe | Nikita Mahajan | Rahul Suryawanshi
Split Personality Malware: A Security Threat

Author(s): Nisha Lalwani | M.B.Chandak | R.V.Dharaskar
THE EVOLUTION OF THE CUSTOMS UNION

Author(s): Marius BOIŢĂ | Dorina ARDELEAN | Cristian HAIDUC
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
Botnet-A Network Threat

Author(s): Sonal P.Patil | Swatantra Kumar

Tango Rapperswil
Tango Rapperswil

     Save time & money - Smart Internet Solutions