نتایج جستجو برای: act misuse

تعداد نتایج: 189847  

2014
Saman Hedayatpour Nazri Kama Suriayati Chuprat

In recent years, concentration on software design phase for evaluating security into the developing software increased where the cost of fixing errors in design level is several times less than the cost of fixing errors in the coding or implementation levels. One of the main challenges in facing current models that evaluate security into the software design phase refers to the need for existenc...

2003
Jean-Paul M. G. Linnartz Pim Tuyls

In biometrics, a human being needs to be identified based on some characteristic physiological parameters. Often this recognition is part of some security system. Secure storage of reference data (i.e., user templates) of individuals is a key concern. It is undesirable that a dishonest verifier can misuse parameters that he obtains before or during a recognition process. We propose a method tha...

2012
George Magklaras

An Insider Misuse Threat Detection and Prediction Language Georgios Vasilios Magklaras BSc (Hons) MPhil Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of external origin are also dangerous, the insider IT misuse problem is diffi...

Journal: :Pain 2015
Pauline Voon

The recent review by Vowles et al. 5 on the rates of opioid misuse, abuse, and addiction in chronic pain is a sorely needed step in the right direction toward better defining and understanding the prevalence of opioid misuse, abuse, and addiction among individuals with chronic pain. The authors are to be applauded for both synthesizing and advocating for literature using explicit definitions of...

Journal: :Journal of studies on alcohol 1992
J T Shope T E Dielman A T Butchart P C Campanelli D D Kloska

An alcohol misuse prevention study (AMPS) curriculum for fifth- and sixth-grade students was developed, implemented and evaluated with over 5,000 students. The AMPS program emphasized social pressures resistance training, focusing on the immediate effects of alcohol, risks of alcohol misuse and social pressures to misuse alcohol. Schools were randomly assigned to curriculum, curriculum plus boo...

2011
Mansoor Alicherry Angelos D. Keromytis

Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc Networks (MANETs) require destination-based consent networking, where consent needs to be given to send to a destination in any path. These networks are susceptible to multipath misuses by misbehaving nodes. In this ...

2008
Alex H.S. Harris Madeleine S. Frey Anna F. DeBenedetti Katharine A. Bradley

We conducted a standardized review of research on the prevalence of alcohol use or misuse (including alcohol use disorders), and the association of alcohol use or misuse with post-operative surgical complications among US patients. Twenty seven studies that included a preoperative measure of alcohol use or misuse and included at least 50 US surgical patients were identified using a standardized...

2015
Beatrice Setnik Carl L Roland Kenneth W Sommerville Glenn C Pixton Robert Berke Anne Calkins Veeraindar Goli

OBJECTIVE To compare the investigator assessment of patient risk for prescription opioid misuse, abuse, and diversion with patient self-reports of these activities in a population with chronic pain. METHODS As a secondary objective of an open-label, multicenter, primary care-based clinical study to evaluate the success of converting opioid-experienced patients with chronic pain to morphine su...

Journal: :Information Security Journal: A Global Perspective 2012
Oluwasefunmi 'Tale Arogundade Adio T. Akinwale Z. Jin X. G. Yang

Preview Buy now DOI: 10.1080/19393555.2011.652290 O. T. Arogundadea*, A. T. Akinwaleb, Z. Jinc & X. G. Y anga pages 137-149 Version of record first published: 14 May 2012 Article Views: 66 Alert me TOC email alert TOC RSS feed Citation email alert Citation RSS feed ABSTRACT Misuse cases are currently used to identify safety and security threats and subsequently capture safety and security requi...

2012
Mohammad Saadatnia Neda Naghavi Farzad Fatehi Mohammad Zare Marzieh Tajmirriahi

BACKGROUND Consumption of oral contraceptive pills (OCP) is a known risk factor for cerebral venous and sinus thrombosis (CVST) among women. We determined whether misuse of OCP could increase the risk of CVST in women. METHODS A case-control study was conducted from 2003 to 2007 on 64 female patients with CVST admitted to Al- Zahra medical center and 232 healthy age-matched female OCP users a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید