Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Jennifer T. Jackson"'
Autor:
Jennifer T. Jackson, Ann Abraham, Kathleen R. El Said, William Odom, Dean W. Bodager, Leanne J. Flewelling, Stephen P. Geiger, April A. Granholm
Publikováno v:
Toxicon. 191:9-17
Brevetoxins were confirmed in urine specimens from patients diagnosed with neurotoxic shellfish poisoning (NSP) after consumption of gastropods that were recreationally harvested from an area previously affected by a Karenia brevis bloom. Several spe
Autor:
Jennifer T. Jackson, Sarah D. Matthews
Publikováno v:
American journal of infection control. 49(12)
Background: Local health departments require assurance of competence of their workforce to prevent and mitigate outbreaks by supporting the implementation of evidence-based actions in clinical practice, medical procedures and infection control practi
Publikováno v:
CICS
Maintaining an adequate level of security in computer networks is a co-evolving process between improved security techniques and ever more sophisticated attack methods. Our appetite for new technologies shows no abating, evidenced most recently by th
Autor:
Mark S. Leeson, Jennifer T. Jackson
Publikováno v:
Research and Development in Intelligent Systems XXVII ISBN: 9780857291295
SGAI Conf.
SGAI Conf.
The diversity of future technologies requiring ad hoc networks to operate within unpredicted situations will mean an increase in the required flexibility of the actual protocols used for communicating information. A methodology is proposed to genetic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7eb9699b56c2248dc686020a3ea405f5
https://doi.org/10.1007/978-0-85729-130-1_32
https://doi.org/10.1007/978-0-85729-130-1_32
Autor:
Axon, Louise, Erola, Arnau, Agrafiotis, Ioannis, Uuganbayar, Ganbayar, Goldsmith, Michael, Creese, Sadie
Publikováno v:
Digital Threats: Research & Practice; Dec2023, Vol. 4 Issue 4, p1-38, 38p
Publikováno v:
2016 International Conference on Data Mining & Advanced Computing (SAPIENCE); 2016, p241-245, 5p
Publikováno v:
2015 International Conference on BioPhotonics (BioPhotonics); 2015, p236-241, 6p
Autor:
Jackson, Jennifer T., Creese, Sadie
Publikováno v:
IEEE Transactions on Dependable & Secure Computing; Dec2012, Vol. 9 Issue 6, p930-943, 14p, 5 Diagrams, 4 Charts, 18 Graphs
Autor:
Fei Hu
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brin