Advertisement

Topics

PubMed Journals Articles About "Tenable Network Security" RSS

05:23 EST 12th December 2018 | BioPortfolio

Tenable Network Security PubMed articles on BioPortfolio. Our PubMed references draw on over 21 million records from the medical literature. Here you can see the latest Tenable Network Security articles that have been published worldwide.

More Information about "Tenable Network Security" on BioPortfolio

We have published hundreds of Tenable Network Security news stories on BioPortfolio along with dozens of Tenable Network Security Clinical Trials and PubMed Articles about Tenable Network Security for you to read. In addition to the medical data, news and clinical trials, BioPortfolio also has a large collection of Tenable Network Security Companies in our database. You can also find out about relevant Tenable Network Security Drugs and Medications on this site too.

Showing "Tenable Network Security" PubMed Articles 1–25 of 4,900+

Emotional security theory: An application to sibling bereavement.

There is a need for guiding theory to understand the experiences and outcomes of bereaved siblings, particularly from a family systems framework. The present study investigated the relevance of emotional security theory in a sample of 72 young adults who experienced sibling bereavement. We investigated (1) whether perceptions of prolonged parental grief predicted key aspects of emotional security (disengagement, preoccupation, and security), and (2) whether emotional security mediated a relation between per...


Walking a security tightrope: relationship-induced changes in attachment security.

Little is known about how romantic relationships enhance long-term attachment security. Change is likely to involve revising deep-seated beliefs and expectations regarding one's self as being unworthy and others as untrustworthy (insecure internal working models). When individuals become anxious, partners can provide immediate reassurance, but the path to long-term security may hinge on addressing the individual's insecure self-perceptions; when individuals become avoidant, partners can 'soften' interaction...

Public social security burden of musculoskeletal diseases in Brasil-Descriptive study.

To present data on the social security burden of diseases of the musculoskeletal system and connective tissue (DSOTC) in Brasil in 2014, and evolution of these social security expenditures between 2009 and 2014.


Updating energy security and environmental policy: Energy security theories revisited.

The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and...

Analyzing Cyber-Physical Threats on Robotic Platforms.

Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequence...

Displacement of social security and social disprotection in Brazil.

After 30 years in force, CF-88 must be salvaged and commemorated but also evaluated in relation to how much social and political resistance it acquired in the execution of its determinations. These determinations not only conflict with those of the dictatorial period preceding it but were also shown to be minimally attractive to neoliberal forces in Brazil in the late 1980s and early 1990s and are now widely recognized as conservative. One of the main recommendations of CF-88 - the subject of this article -...

Synthesizing water quality indicators from standardized geospatial information to remedy water security challenges: A review.

Water is vital not only for food, energy and sanitation but also for ecosystem functioning, human health, socio-economic progress and poverty reduction. Water security exists when all people have physical and economical access to sufficient, safe, and clean water that meets basic needs. However, water security is threatened by growing human population, episodic environmental disasters, indiscriminate land management practices, contaminants, and escalation in geopolitical conflicts.

How to Lead During the Next Health Security Crisis The Public Health Crisis Survival Guide: Leadership and Management in Trying Times , by Joshua M. Sharfstein , Reviewed by Jennifer B. Nuzzo.

The Experience of Medical Communication in Adults with Acute Leukemia: Impact of Age and Attachment Security.

Healthcare providers' (HCPs) communication with cancer patients provides both information and support. Younger patient age and greater difficulty accepting support (attachment security) have been linked to poorer communication experiences with HCPs. The present secondary data analysis examined the impact of age group and attachment security on perceived communication problems with HCPs in adults with acute leukemia (AL).

Public Health Communication: A Vital Component of Health Security.

Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps.

Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement protocol (3PAKA) using chaotic maps has three security vulnerabilities; in particular, it cannot resist offline password guessing attack, Bergamo et al.'s attack and impersonation attack, and then they proposed an improved protocol. However, we demonstrate that Lu et al.'s attacks on Xie et al.'s scheme are unworkable, and their improved protocol is insecure against stolen-verifier attack and off-line password gue...

Evaluation of Job-Related Anxiety Symptoms Among Brazilian Social Security Medical Experts.

The function of a medical expert within the scope of the Brazilian social security system consists of medically evaluating the examinee to draw a conclusive opinion on the person's working ability capacity and to characterize the disability for social security and assistance purposes. Forensic decisions inevitably converge on two opposite outcomes: concession or refusal. Rejection is against the interests of the candidates, who can direct their disappointment and dissatisfaction at the professional, exposin...

Open grid model of Australia's National Electricity Market allowing backtesting against historic data.

Rising electricity prices, concerns regarding system security, and emissions reduction are central to an energy policy debate under way in Australia. To better evaluate mechanisms that seek to address the nexus of engineering, economic, and environmental challenges facing the country's electricity system, we have constructed network and generator datasets describing the operation of Australia's largest transmission network. These data have been collated using open-source software, and are available under an...

Impact of Hajj on Global Health Security.

With the human society transfers from scattered pieces to a society as a whole and the advent of the aviation era, the occurrence of infectious diseases and their diffusion have led to international health security issues. As the world's largest and irrevocable annual transnational religious movement, the Hajj and its connection with health security concerns have caught attention since the ancient times, because a huge population from all over the world gathers in the holy city of Mecca, which has tropical ...

Living Well in Times of Threat: The Importance of Adjustment Processes to Explain Functional Adaptation to Uncertain Security in Expatriates Deployed in the Sudan.

The present study investigated expatriate humanitarian aid workers' perceptions and responses to uncertain security while deployed in the Sudan. Interviews conducted in Khartoum (n = 7) and Darfur (n = 17) focused on risk perception, concern for personal security, and strategies used to function well in an insecure environment. Despite a high perceived general risk, as well as broad knowledge and experience with security incidents, participants often expressed low concern. General adjustment processes were ...

Research on Experimental Model of Security Assessment of DEHP Migration from PVC-Tubes Medical Devices.

As we all know, DEHP is seriously harmful to human health and consequently has been acquired critical attention. DEHP is able to migrate from PVC medical devices for the non-chemically bound to PVC, thus contact with user and patient. The DEHP migration is influenced by various parameters. In order to assess the security of PVC-tubes medical devices scientifically of DEHP migration, we develop an experimental model by analyzing the parameters comprehensively and systematically, taking into account the clini...

Surgical aortic valve replacement and transcatheter aortic valve implantation for severe aortic stenosis: Equipoise remains a tenable assumption.

Nuclear and Radiological Source Security Culture Assessment of Radioactive Material Users at a University.

Securing radioactive sources has become increasingly important given the rising threat of radiological terrorism. While radiation safety has long been established in most applicable industries, the importance of nuclear and radiological source security has lagged behind in nonnuclear material specific industries, such as academic institutions and medical facilities. To evaluate the attitudes and behaviors regarding nuclear security culture, an assessment of nuclear and radiological material practices was de...

Towards Genetic Cryptography for Biomedical Wireless Sensor Networks Gateways.

The integration of wireless sensor networks into Internet of things, led to a new generation of sensor nodes, directly connected to remote servers, for signal processing and decision making. The migration of data processing from local node, achieved by decoupling the node hardware from the required processing capabilities, is only possible through implementations of network virtualization. The virtualization which brings, new services that are executed remotely has led to security challenges, yet to be reso...

The Odyssey's mythological network.

In this work, we study the mythological network of Odyssey of Homer. We use ordinary statistical quantifiers in order to classify the network as real or fictional. We also introduce an analysis of communities which allows us to see how network properties shall emerge. We found that Odyssey can be classified both as real and fictional network. This statement is supported as far as mythological characters are removed, which results in a network with real properties. The community analysis indicated to us that...

Peer support and food security in deaf college students.

The purpose of the study was to investigate whether peer support and demographic characteristics predicted food security among deaf college students.

A Lightweight Protocol for Secure Video Streaming.

The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy...

Secure Quaternion Feistel Cipher (S-QFC) for DICOM Images.

An improved and extended version of a quaternion-based lossless encryption technique for DICOM images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed S-QFC algorithm retains the concept of a modified Feistel network with modular arithmetic and the use of special properties of quaternions to perform rotations of data sequences in 3D space for each of the cipher rounds. A new and ...

Systematic review of the effects of agricultural interventions on food security in northern Ghana.

Food insecurity and poverty rates in Ghana are highest in the districts from latitude 8° N upwards. These have motivated several interventions aimed at addressing the food insecurity via promoting agricultural growth. An assessment of the overall impact of these interventions on food security is necessary to guide policy design and future interventions.

Multiple non-climatic drivers of food insecurity reinforce climate change maladaptation trajectories among Peruvian Indigenous Shawi in the Amazon.

Climate change is affecting food systems globally, with implications for food security, nutrition, and the health of human populations. There are limited data characterizing the current and future consequences of climate change on local food security for populations already experiencing poor nutritional indicators. Indigenous Amazonian populations have a high reported prevalence of nutritional deficiencies. This paper characterizes the food system of the Shawi of the Peruvian Amazon, climatic and non-climat...


Advertisement
Quick Search
Advertisement
Advertisement