Advertisement

Topics

PubMed Journals Articles About "Tenable Network Security" RSS

11:19 EDT 25th September 2018 | BioPortfolio

Tenable Network Security PubMed articles on BioPortfolio. Our PubMed references draw on over 21 million records from the medical literature. Here you can see the latest Tenable Network Security articles that have been published worldwide.

More Information about "Tenable Network Security" on BioPortfolio

We have published hundreds of Tenable Network Security news stories on BioPortfolio along with dozens of Tenable Network Security Clinical Trials and PubMed Articles about Tenable Network Security for you to read. In addition to the medical data, news and clinical trials, BioPortfolio also has a large collection of Tenable Network Security Companies in our database. You can also find out about relevant Tenable Network Security Drugs and Medications on this site too.

Showing "Tenable Network Security" PubMed Articles 1–25 of 4,800+

Utilising a multi-item questionnaire to assess household food security in Australia.

Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed with underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables.


Attachment security priming: a systematic review.

Attachment security priming has been used to shed light on the cognitive processes related to attachment internal working models as well as the cognitive substrates of people's attachment-related affect and behavior. Security primes activate a sense of attachment security by making mental representations in one's memory more accessible and salient. In the current paper, we report on a qualitative synthesis of 20 studies published in the last two years to determine the effects of security priming. We found t...

Emotional security theory: An application to sibling bereavement.

There is a need for guiding theory to understand the experiences and outcomes of bereaved siblings, particularly from a family systems framework. The present study investigated the relevance of emotional security theory in a sample of 72 young adults who experienced sibling bereavement. We investigated (1) whether perceptions of prolonged parental grief predicted key aspects of emotional security (disengagement, preoccupation, and security), and (2) whether emotional security mediated a relation between per...


Walking a security tightrope: relationship-induced changes in attachment security.

Little is known about how romantic relationships enhance long-term attachment security. Change is likely to involve revising deep-seated beliefs and expectations regarding one's self as being unworthy and others as untrustworthy (insecure internal working models). When individuals become anxious, partners can provide immediate reassurance, but the path to long-term security may hinge on addressing the individual's insecure self-perceptions; when individuals become avoidant, partners can 'soften' interaction...

Medical cyber-physical systems: A survey.

Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices. These systems are progressively used in hospitals to achieve a continuous high-quality healthcare. The MCPS design faces numerous challenges, including inoperability, security/privacy, and high assurance in the system software. In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed. This article enriched the researches of the networked Medical Device (MD)...

Food Security and its Related Factors in the Rural Households of Bam City in Iran: A Logistic Regression Model Approach.

Awareness of the food security status of rural population and its influencing factors is essential for policy makers, public health institutions and the development of rural programs. This descriptive cross-sectional study was conducted in 2017 on 384 rural households in Bam city. The data was collected via the 6-item USDA questionnaire. Logistic regression was used to determine the relationship between social, economic and health factors with food security. The results indicate that 35.67% of households ha...

Public social security burden of musculoskeletal diseases in Brasil-Descriptive study.

To present data on the social security burden of diseases of the musculoskeletal system and connective tissue (DSOTC) in Brasil in 2014, and evolution of these social security expenditures between 2009 and 2014.

On the security of consumer wearable devices in the Internet of Things.

Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connec...

Updating energy security and environmental policy: Energy security theories revisited.

The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and...

A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks.

The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separat...

Analyzing Cyber-Physical Threats on Robotic Platforms.

Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequence...

Displacement of social security and social disprotection in Brazil.

After 30 years in force, CF-88 must be salvaged and commemorated but also evaluated in relation to how much social and political resistance it acquired in the execution of its determinations. These determinations not only conflict with those of the dictatorial period preceding it but were also shown to be minimally attractive to neoliberal forces in Brazil in the late 1980s and early 1990s and are now widely recognized as conservative. One of the main recommendations of CF-88 - the subject of this article -...

Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the conf...

Synthesizing water quality indicators from standardized geospatial information to remedy water security challenges: A review.

Water is vital not only for food, energy and sanitation but also for ecosystem functioning, human health, socio-economic progress and poverty reduction. Water security exists when all people have physical and economical access to sufficient, safe, and clean water that meets basic needs. However, water security is threatened by growing human population, episodic environmental disasters, indiscriminate land management practices, contaminants, and escalation in geopolitical conflicts.

Public Health Communication: A Vital Component of Health Security.

Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the ...

Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.

With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attac...

Perceived attachment security to parents and peer victimization: Does adolescent's aggressive behaviour make a difference?

Peer victimization is one of the most prominent problems during adolescence. Research has distinguished aggressive and non-aggressive victims; however, there are still significant drawbacks in understanding the social and family functioning of these different groups of victimized adolescents. This study aimed to compare social behavior and perceived attachment security to parents of Portuguese adolescents, classified as aggressive victims, non-aggressive victims and non-victims. The sample consisted of 222 ...

Impact of Hajj on Global Health Security.

With the human society transfers from scattered pieces to a society as a whole and the advent of the aviation era, the occurrence of infectious diseases and their diffusion have led to international health security issues. As the world's largest and irrevocable annual transnational religious movement, the Hajj and its connection with health security concerns have caught attention since the ancient times, because a huge population from all over the world gathers in the holy city of Mecca, which has tropical ...

Research on Experimental Model of Security Assessment of DEHP Migration from PVC-Tubes Medical Devices.

As we all know, DEHP is seriously harmful to human health and consequently has been acquired critical attention. DEHP is able to migrate from PVC medical devices for the non-chemically bound to PVC, thus contact with user and patient. The DEHP migration is influenced by various parameters. In order to assess the security of PVC-tubes medical devices scientifically of DEHP migration, we develop an experimental model by analyzing the parameters comprehensively and systematically, taking into account the clini...

Surgical aortic valve replacement and transcatheter aortic valve implantation for severe aortic stenosis: Equipoise remains a tenable assumption.

Assessing national nutrition security: The UK reliance on imports to meet population energy and nutrient recommendations.

Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and...

An improved anonymous authentication scheme for roaming in ubiquitous networks.

With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low co...

Towards Genetic Cryptography for Biomedical Wireless Sensor Networks Gateways.

The integration of wireless sensor networks into Internet of things, led to a new generation of sensor nodes, directly connected to remote servers, for signal processing and decision making. The migration of data processing from local node, achieved by decoupling the node hardware from the required processing capabilities, is only possible through implementations of network virtualization. The virtualization which brings, new services that are executed remotely has led to security challenges, yet to be reso...

The Odyssey's mythological network.

In this work, we study the mythological network of Odyssey of Homer. We use ordinary statistical quantifiers in order to classify the network as real or fictional. We also introduce an analysis of communities which allows us to see how network properties shall emerge. We found that Odyssey can be classified both as real and fictional network. This statement is supported as far as mythological characters are removed, which results in a network with real properties. The community analysis indicated to us that...


Advertisement
Quick Search
Advertisement
Advertisement