نتایج جستجو برای: bad mouthing attack

تعداد نتایج: 110943  

Journal: :JPMA. The Journal of the Pakistan Medical Association 2010
Sidra Ishaque Taimur Saleem Fariha Batool Khawaja Waris Qidwai

OBJECTIVE To explore patient's perspectives and expectations from physicians with respect to breaking of bad news. METHODS A cross-sectional survey was carried out in the Community Health Centre of a tertiary care teaching hospital in Pakistan. All consenting individuals from 18 to 60 years of age were interviewed on the basis of a structured, pre-tested questionnaire. RESULTS The response ...

Journal: :Cell 2013
Jie Yan Jialing Xiang Yutin Lin Jingui Ma Jiyan Zhang Hao Zhang Jisheng Sun Nika N. Danial Jing Liu Anning Lin

The IκB kinase complex (IKK) is a key regulator of immune responses, inflammation, cell survival, and tumorigenesis. The prosurvival function of IKK centers on activation of the transcription factor NF-κB, whose target gene products inhibit caspases and prevent prolonged JNK activation. Here, we report that inactivation of the BH3-only protein BAD by IKK independently of NF-κB activation suppre...

Journal: :JNW 2015
Muhammad Morshed Alam Muhammad Yeasir Arafat Feroz Ahmed

Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at application level can be computationally expensive and difficult to scale, while still creating bo...

Journal: :The international journal of occupational and environmental medicine 2011
M M Bruce

What may cause a heart attack build up gradually. Being a couch-potato, boredom eating without exercising are very bad habits that may possibly begin in when we are children. An increasing number of medical doctors are starting to find out victims of heart attacks in their 20's and 30's compared to sufferers mostly in their 50's and 60's. Being in shape and at the ideal weight does not make you...

1996

THE JOINT surveillance and target attack radar system (JSTARS) promises to revolutionize how US forces conduct conventional warfare. Before the development of JSTARS, US forces de­ pended on close operations to defeat an enemy army. Because airpower’s ability to destroy an enemy’s mo­ bile ground forces was severely limited, especially during darkness and bad weather, interdiction proved import...

Journal: :Foundations and Trends in Networking 2015
Jonathan Ponniah Yih-Chun Hu Panganamala Ramana Kumar

Traditionally, wireless network protocols have been developed for performance. Subsequently, as attacks are identified, patches or defenses have been developed. This has led to an “arms race,” where one is never confident about what other vulnerabilities may be exposed in the future. We seek to reverse this process. We identify a set of axioms describing a model, under which we develop a secure...

2004
Zang Li Yanyong Zhang Wade Trappe Badri Nath

The infrastructure provided by wireless networks promises to have a significant impact on the way computing is performed. Not only will information be available while we are on the go, but new locationaware computing paradigms along with location-sensitive security policies will emerge. Already, many techniques have emerged to provide the ability to localize a communicating device [?], [1]–[4]....

2002
Achilles’ Heel James M. Loy Robert G. Ross

Given the importance of international goods and materials to the American economy, closing our borders for more than a short period is infeasible. Furthermore, with our growing reliance on just-in-time delivery of foreign goods, even slowing the flow long enough to inspect either all or a statistically significant random selection of imports would be economically intolerable. However, the trans...

Journal: :Journal of Exposure Science & Environmental Epidemiology 1999

2012
Francisco Corella

This white paper presents a method for protecting a Web application against online password-guessing attacks. A user logs in with three credentials: the name of the application instance, a user ID, and a password, where the instance name is a secret known only to the instance users, the user ID is a secret kwnon only to the instance administrators, and the password is a secret known only to the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید