نتایج جستجو برای: unauthorized tissues

تعداد نتایج: 198978  

Background & Aims of the Study: Risky driving behaviors are a set of actions that put drivers at the risk of death or injuries which are caused by the violations of legal standards. These kinds of behaviors are the key factor leading to a higher risk of traffic crashes and injuries. The present study aimed to investigate the situation of some high-risk traffic behaviors and the related factors ...

Journal: :modares journal of medical sciences: pathobiology 2006
fereshteh zare abdolhossein dalimi asl fatemeh ghaffarifar

objectives: toxoplasma gondii is a coccidian protozoon which forms tissue cyst in different organs of infected intermediate host. the present study was conducted to demonstrate the active form of parasite in different tissues of rat, which was experimentally infected with rh strain of toxoplasma gondii using bioassay method inmice. materials & methods: in the experimental assay, 75 rats an...

Journal: :Issue brief 2003
Mila Kofman Kevin Lucia Eliza Bangit

T he United States is experiencing an unprecedented influx of unauthorized insurers selling phony health insurance.The last time this occurred, more than a decade ago, nearly 400,000 people were left with $123 million in unpaid medical bills. Unauthorized health insurance companies intentionally fail to comply with state and federal law regarding insurance regulation; they collect premiums for ...

2011
Georgios Portokalidis Angelos D. Keromytis

Instruction-set randomization (ISR) obfuscates the “language” understood by a system to protect against code-injection attacks by presenting an ever-changing target. ISR was originally motivated by code injection through buffer overflow vulnerabilities. However, Stuxnet demonstrated that attackers can exploit other vectors to place malicious binaries into a victim’s filesystem and successfully ...

2004
Haidong Xia José Carlos Brustoloni

Academic and commercial 802.11 hotspots often use an SSLsecured captive portal to authenticate clients. Captive portals provide good usability and interoperability, but poor security. After a captive portal has authenticated a client, session hijacking and freeloading allow attackers to capture or use the client’s session. Freeloading does not require special tools and, surprisingly, is strengt...

Journal: :CoRR 2012
Yordan Kalmukov

The modern multi-tier web applications and information systems store and process various types of data. Some of them are stored in a database, controlled by an external database management system, while other data are stored directly within the server’s file system. The database is secured by the database management system itself, but it is a programmer’s responsibility to design and develop a ...

Journal: :Journal of law and health 1995
Thomas Lundmark

2006
Matthew P. Martens Richard F. Haase

(this article cites 46 articles hosted on the Citations use or unauthorized distribution.

Journal: :Ad Hoc Networks 2012
Song Liu Larry J. Greenstein Wade Trappe Yingying Chen

1570-8705/$ see front matter 2011 Published b doi:10.1016/j.adhoc.2011.04.003 ⇑ Corresponding author. E-mail addresses: [email protected] ( rutgers.edu (L.J. Greenstein), [email protected] [email protected] (Y. Chen). Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that access spectrum resources in a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید