To see the other types of publications on this topic, follow the link: Pre-existing vulnerabilities.

Journal articles on the topic 'Pre-existing vulnerabilities'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Pre-existing vulnerabilities.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

van Zuiden, Mirjam, Annemieke Kavelaars, Elbert Geuze, Miranda Olff, and Cobi J. Heijnen. "Predicting PTSD: Pre-existing vulnerabilities in glucocorticoid-signaling and implications for preventive interventions." Brain, Behavior, and Immunity 30 (May 2013): 12–21. http://dx.doi.org/10.1016/j.bbi.2012.08.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cabin, William. "Pre-Existing Inequality: The Impact of COVID-19 on Medicare Home Health Beneficiaries." Home Health Care Management & Practice 33, no. 2 (2021): 130–36. http://dx.doi.org/10.1177/1084822321992380.

Full text
Abstract:
There is significant data on the adverse impact of COVID-19 on persons who were poor, minorities, had compromised physical or mental health, or other vulnerabilities prior to the COVID-19 pandemic. A significant portion of the overall Medicare population has such vulnerabilities. The Medicare home health beneficiary population is even more vulnerable than the overall Medicare population based on gender, race, income level, living alone status, and number of chronic conditions. A literature review indicates there is only 1 study on the impact of COVID-19 in Medicare home health on home care wor
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Jie, Gehao Lu, and Jia Yu. "A Smart Contract Vulnerability Detection Method Based on Heterogeneous Contract Semantic Graphs and Pre-Training Techniques." Electronics 13, no. 18 (2024): 3786. http://dx.doi.org/10.3390/electronics13183786.

Full text
Abstract:
The use of smart contracts in areas such as finance, supply chain management, and the Internet of Things has significantly advanced blockchain technology. However, once deployed on the blockchain, smart contracts cannot be modified or revoked. Any vulnerabilities can lead to severe economic losses and data breaches, making pre-deployment vulnerability detection critically important. Traditional smart contract vulnerability detection methods suffer from low accuracy and limited reusability across different scenarios. To enhance detection capabilities, this paper proposes a smart contract vulner
APA, Harvard, Vancouver, ISO, and other styles
4

Schweizerhof, Margarete, Zechser Adrian, and Artur Mueller. "Effects of the measures to contain the Covid-19 pandemic on pre-existing mental vulnerabilities and disorders." SCENTIA International Economic Review 1, no. 2 (2022): 11–35. http://dx.doi.org/10.52514/sier.v1i2.25.

Full text
Abstract:
This article deals with the following question: "What is the impact of certain pandemic control measures on patient groups with specific mental illnesses, and what are the economic effects on public health?"
 For this purpose, 103 patients of psychotherapeutic practice in Germany in the periods before, during and at the current time (April, May 2021) were asked in a twenty-minute survey to indicate the development of their psychiatric symptoms concerning individual measures to combat the pandemic and concerning the general pandemic situation. The collected data were divided into specific
APA, Harvard, Vancouver, ISO, and other styles
5

Sekalala, Sharifah, Katrina Perehudoff, Michael Parker, Lisa Forman, Belinda Rawson, and Maxwell Smith. "An intersectional human rights approach to prioritising access to COVID-19 vaccines." BMJ Global Health 6, no. 2 (2021): e004462. http://dx.doi.org/10.1136/bmjgh-2020-004462.

Full text
Abstract:
We finally have a vaccine for the COVID-19 crisis. However, due to the limited numbers of the vaccine, states will have to consider how to prioritise groups who receive the vaccine. In this paper, we argue that the practical implementation of human rights law requires broader consideration of intersectional needs in society and the disproportionate impact that COVID-19 is having on population groups with pre-existing social and medical vulnerabilities. The existing frameworks/mechanisms and proposals for COVID-19 vaccine allocation have shortcomings from a human rights perspective that could b
APA, Harvard, Vancouver, ISO, and other styles
6

Kuz, Antonieta. "Educational technological inequalities expressed during confinement by COVID19." EDMETIC 11, no. 2 (2022): 5. http://dx.doi.org/10.21071/edmetic.v11i2.13657.

Full text
Abstract:
In Argentina, in March 2020, face-to-face classes were suspended to prevent the spread of the covid-19 with a prolonged quarantine. The design of this work seeks to know some of the factors that operate at the origin of pre-existing technological inequalities. The information was obtained through a quantitative design with 290 students during the year 2020 in Buenos Aires combined non-experimental with descriptive scope, exploratory in nature through interviews with 3 teachers. Combining both analyses we found relevant findings on socio-educational inequalities, with an emphasis on the interpr
APA, Harvard, Vancouver, ISO, and other styles
7

Cetin, Ronay, Eva Quandt, and Manuel Kaulich. "Functional Genomics Approaches to Elucidate Vulnerabilities of Intrinsic and Acquired Chemotherapy Resistance." Cells 10, no. 2 (2021): 260. http://dx.doi.org/10.3390/cells10020260.

Full text
Abstract:
Drug resistance is a commonly unavoidable consequence of cancer treatment that results in therapy failure and disease relapse. Intrinsic (pre-existing) or acquired resistance mechanisms can be drug-specific or be applicable to multiple drugs, resulting in multidrug resistance. The presence of drug resistance is, however, tightly coupled to changes in cellular homeostasis, which can lead to resistance-coupled vulnerabilities. Unbiased gene perturbations through RNAi and CRISPR technologies are invaluable tools to establish genotype-to-phenotype relationships at the genome scale. Moreover, their
APA, Harvard, Vancouver, ISO, and other styles
8

Armingeon, Klaus, Caroline de la Porte, Elke Heins, and Stefano Sacchi. "Voices from the past: economic and political vulnerabilities in the making of next generation EU." Comparative European Politics 20, no. 2 (2022): 144–65. http://dx.doi.org/10.1057/s41295-022-00277-6.

Full text
Abstract:
AbstractIn this article, we show that Next Generation EU (NGEU) is mainly a response to the economic and political imbalances left over from the Eurozone crisis. It is a pre-emptive intervention, especially targeted at structurally weak economies with rising Euroscepticism, to avoid costly ex-post bailouts as in the Great Recession. We demonstrate, using quantitative analysis, that pre-existing vulnerabilities, rather than the impact of the pandemic, drove the allocation of NGEU resources: per capita grants largely correspond to past economic vulnerabilities, as well as to political ones. Coun
APA, Harvard, Vancouver, ISO, and other styles
9

Lewis, Stephanie J., Karestan C. Koenen, Antony Ambler, et al. "Unravelling the contribution of complex trauma to psychopathology and cognitive deficits: a cohort study." British Journal of Psychiatry 219, no. 2 (2021): 448–55. http://dx.doi.org/10.1192/bjp.2021.57.

Full text
Abstract:
BackgroundComplex traumas are traumatic experiences that involve multiple interpersonal threats during childhood or adolescence, such as repeated abuse. These traumas are hypothesised to cause more severe psychopathology and poorer cognitive function than other non-complex traumas. However, empirical testing has been limited to clinical/convenience samples and cross-sectional designs.AimsTo investigate psychopathology and cognitive function in young people exposed to complex, non-complex or no trauma, from a population-representative longitudinal cohort, and to consider the role of pre-existin
APA, Harvard, Vancouver, ISO, and other styles
10

Meyers, Benjamin S., Sultan Fahad Almassari, Brandon N. Keller, and Andrew Meneely. "Examining Penetration Tester Behavior in the Collegiate Penetration Testing Competition." ACM Transactions on Software Engineering and Methodology 31, no. 3 (2022): 1–25. http://dx.doi.org/10.1145/3514040.

Full text
Abstract:
Penetration testing is a key practice toward engineering secure software. Malicious actors have many tactics at their disposal, and software engineers need to know what tactics attackers will prioritize in the first few hours of an attack. Projects like MITRE ATT&CK™ provide knowledge, but how do people actually deploy this knowledge in real situations? A penetration testing competition provides a realistic, controlled environment with which to measure and compare the efficacy of attackers. In this work, we examine the details of vulnerability discovery and attacker behavior with the goal
APA, Harvard, Vancouver, ISO, and other styles
11

Akacha, Souheil Abdel-Latif, and Ali Ismail Awad. "Enhancing Security and Sustainability of e-Learning Software Systems: A Comprehensive Vulnerability Analysis and Recommendations for Stakeholders." Sustainability 15, no. 19 (2023): 14132. http://dx.doi.org/10.3390/su151914132.

Full text
Abstract:
The onset of the COVID-19 pandemic prompted educational institutions to swiftly integrate e-learning software systems, including learning management systems (LMSs), as essential tools for online education. This study aims to probe the inherent security vulnerabilities of three widely utilized e-learning platforms, namely, Moodle, Chamilo, and Ilias, spanning the pre-pandemic, pandemic, and post-pandemic periods. The rapid adoption of these platforms during the pandemic revolutionized online education but also unveiled security risks. This paper delves into these security vulnerabilities, offer
APA, Harvard, Vancouver, ISO, and other styles
12

Ogunlesi, A. O., and E. O. Akande. "Mental illness in the medical profession: Nigeria in the world." Psychiatric Bulletin 16, no. 8 (1992): 502–3. http://dx.doi.org/10.1192/pb.16.8.502.

Full text
Abstract:
It is widely acknowledged that the medical profession can be highly stressful. In addition, practitioners in many developing countries face the peculiar problems of poor remuneration, lack of necessary clinical facilities and a heavy clinical case load (due to the lack of qualified manpower). Such a scenario can easily aggravate those medical practitioners with pre-existing deeply rooted emotional conflicts as well as personality vulnerabilities and can result in mental decompensation.
APA, Harvard, Vancouver, ISO, and other styles
13

Gao, Gaimei, Zilu Li, Lizhong Jin, Chunxia Liu, Junji Li, and Xiangqi Meng. "RTMS: A Smart Contract Vulnerability Detection Method Based on Feature Fusion and Vulnerability Correlations." Electronics 14, no. 4 (2025): 768. https://doi.org/10.3390/electronics14040768.

Full text
Abstract:
Smart contracts are at the core of blockchain technology, but the cost of fixing their security vulnerabilities is high, making pre-deployment vulnerability detection crucial. Existing methods rely on fixed rules, which have limitations in accuracy and scalability, and their efficiency decreases with the complexity of the rules. Neural-network-based methods can identify some vulnerabilities but are inefficient in multi-vulnerability scenarios and depend on source code. To address these issues, we propose a multi-vulnerability-based smart contract detection method called RTMS. RTMS takes byteco
APA, Harvard, Vancouver, ISO, and other styles
14

Jamaluddin, Jamil, Fazrun Zaini, Abubakr Elamin Abdalla, and Nurulhuda Firdaus Mohd Azmi. "Pre and Post Seismic Assessment for an Onshore Oil and Gas Facility in Sabah." Semarak Proceedings of Applied Sciences and Engineering Technology 1, no. 1 (2025): 144–52. https://doi.org/10.37934/spaset.1.1.144152a.

Full text
Abstract:
Pre and post seismic assessment of an onshore oil and gas facility in Sabah examines the integrity and vulnerability of the assets against earthquake events. Due to the design requirements at the time of project inception, seismic considerations were not included. The necessity for this assessment arises from the heightened seismic activities in Sabah and nearby regions. Pre-seismic assessment evaluates the integrity of existing structures against seismic effects. This involves soil liquefaction susceptibility assessment and seismic reassessment of selected structures and equipment foundations
APA, Harvard, Vancouver, ISO, and other styles
15

Varickanickal, Joann, and K. Bruce Newbold. "Extreme heat events and health vulnerabilities among immigrant and newcomer populations." Environmental Health Review 64, no. 2 (2021): 28–34. http://dx.doi.org/10.5864/d2021-011.

Full text
Abstract:
With higher temperatures linked to increased human morbidity and mortality, the projected increase in the number of extreme heat events (EHEs) due to climate change poses increased risks. Although the old, individuals with pre-existing illnesses, the socially isolated, and individuals with low income or low educational status are more vulnerable to the health effects of EHEs and are targeted in public health messaging, newcomers and immigrants may be less aware of the dangers of EHEs. The impacts of EHEs on the immigrant and newcomer population are not well documented in the Canadian context a
APA, Harvard, Vancouver, ISO, and other styles
16

Joe, Yeonjik, and Minjeong Kim. "Analysis of trends in domestic and international research on educational use of chatbots: systematic literature review." Institute of Educational Research Chonnam National University 45, no. 3 (2023): 1–32. http://dx.doi.org/10.35510/jer.2023.45.3.1.

Full text
Abstract:
This study aims to examine domestic and international research trends on the educational use of pre-existing chatbots used before the advent of Generative AI chatbots, and to derive practical and practical implications for future educational use and research directions of Generative AI chatbots. To this end, this study conducted trend research as a method of systematic literature review to examine the application methods and effects of pre-existing chatbots by domestic and international research subjects, educational or educational fields, and fields. First, as a result of examining the subjec
APA, Harvard, Vancouver, ISO, and other styles
17

Zhao, Zheng, Tianhao Zhang, Xiaoya Fan, Qian Mao, Dafeng Wang, and Qi Zhao. "GMN+: A Binary Homologous Vulnerability Detection Method Based on Graph Matching Neural Network with Enhanced Attention." Applied Sciences 14, no. 22 (2024): 10762. http://dx.doi.org/10.3390/app142210762.

Full text
Abstract:
The widespread reuse of code in the open-source community has led to the proliferation of homologous vulnerabilities, which are security flaws propagated across diverse software systems through the reuse of vulnerable code. Such vulnerabilities pose serious cybersecurity risks, as attackers can exploit the same weaknesses across multiple platforms. Deep learning has emerged as a promising approach for detecting homologous vulnerabilities in binary code due to their automated feature extraction and high efficiency. However, existing deep learning methods often struggle to capture deep semantic
APA, Harvard, Vancouver, ISO, and other styles
18

Barr, Makenzie L., Courtney Martin, Courtney Luecking, and Kathryn Cardarelli. "Losses, Gains, and Changes to the Food Environment in a Rural Kentucky County during the COVID-19 Pandemic." Nutrients 13, no. 11 (2021): 3929. http://dx.doi.org/10.3390/nu13113929.

Full text
Abstract:
The COVID-19 pandemic has caused alterations to be made in the way many people access, prepare, and consume food. Rural communities are particularly impacted due to pre-existing structural vulnerabilities, i.e., poverty, lack of infrastructure, and limited fresh food options. This study aimed to characterize experiences of one rural Appalachian community’s changes to the food environment during the pandemic. In April 2021, six focus groups were conducted with residents of Laurel County, Kentucky. Using grounded theory, we identified losses, gains, and overall changes to the community food envi
APA, Harvard, Vancouver, ISO, and other styles
19

Wang, Heping, Augustin Luna, Gonghong Yan, et al. "Abstract 1002: Targeting adaptation to cancer treatment by drug combinations." Cancer Research 82, no. 12_Supplement (2022): 1002. http://dx.doi.org/10.1158/1538-7445.am2022-1002.

Full text
Abstract:
Abstract Adaptation of tumors to therapeutic interventions contributes to dismal long-term patient outcomes. Adaptation to therapy involves the co-action of functionally related proteins that together activate cell survival programs and compensate for the therapeutic impact. Oncogenic dependencies to such adaptive events, however, can generate new therapeutic vulnerabilities that can be targeted with drug combinations. The precision medicine approaches in which targeted drugs are matched to pre-existing genomic aberrations fail to address the adaptive responses and resulting vulnerabilities. H
APA, Harvard, Vancouver, ISO, and other styles
20

Charnley, Gina E. C., Sebastian Yennan, Chinwe Ochu, Ilan Kelman, Katy A. M. Gaythorpe, and Kris A. Murray. "The impact of social and environmental extremes on cholera time varying reproduction number in Nigeria." PLOS Global Public Health 2, no. 12 (2022): e0000869. http://dx.doi.org/10.1371/journal.pgph.0000869.

Full text
Abstract:
Nigeria currently reports the second highest number of cholera cases in Africa, with numerous socioeconomic and environmental risk factors. Less investigated are the role of extreme events, despite recent work showing their potential importance. To address this gap, we used a machine learning approach to understand the risks and thresholds for cholera outbreaks and extreme events, taking into consideration pre-existing vulnerabilities. We estimated time varying reproductive number (R) from cholera incidence in Nigeria and used a machine learning approach to evaluate its association with extrem
APA, Harvard, Vancouver, ISO, and other styles
21

Luna, Augustin, Heping Wang, Gonghong Yan, et al. "Abstract 1759: Targeting adaptation to cancer treatment by drug combinations." Cancer Research 83, no. 7_Supplement (2023): 1759. http://dx.doi.org/10.1158/1538-7445.am2023-1759.

Full text
Abstract:
Abstract Adaptation of tumors to therapeutic interventions contributes to dismal long-term patient outcomes. Adaptation to therapy involves co-action of functionally related proteins that together activate cell survival programs and compensate for the therapeutic impact. Oncogenic dependencies to such adaptive events, however, can generate new therapeutic vulnerabilities that can be targeted with drug combinations. The precision medicine approaches in which targeted drugs are matched to pre-existing genomic aberrations fail to address the adaptive responses and resulting vulnerabilities. Here,
APA, Harvard, Vancouver, ISO, and other styles
22

Lewis, Stephanie J., Karestan C. Koenen, Antony Ambler, et al. "Psychopathology and cognitive deficits in young people exposed to complex trauma." BJPsych Open 7, S1 (2021): S36—S37. http://dx.doi.org/10.1192/bjo.2021.149.

Full text
Abstract:
AimsComplex traumas are traumatic experiences that involve multiple interpersonal threats during childhood or adolescence, such as repeated abuse. This type of trauma is hypothesized to lead to more severe psychopathology and poorer cognitive function than other non-complex traumas, such as road traffic accidents. However, empirical testing of this hypothesis has been limited to clinical or convenience samples and cross-sectional designs. To better understand this topic, we aimed to investigate psychopathology and cognitive function in young people exposed to complex, non-complex, or no trauma
APA, Harvard, Vancouver, ISO, and other styles
23

Fujimoto, Shinya, Fuminori Kawami, Anna Matsukawa, Shosuke Sato, and Shigeo Tatsuki. "Pre-Existing Inequalities, Post-Event Social Environmental Changes, and Long-Term Trajectories of Life Recovery: Findings from Five-Wave Natori City Life Recovery Panel Survey." Journal of Disaster Research 17, no. 2 (2022): 207–16. http://dx.doi.org/10.20965/jdr.2022.p0207.

Full text
Abstract:
This study aims to clarify: 1) the life recovery trajectories that the Great East Japan Earthquake (GEJE) survivors have followed; 2) the interrelationships between the life recovery trajectories and pre-existing inequalities as well as post-event social environmental changes; and 3) pre- and post-GEJE characteristics of the survivors with stagnant life recovery. The analyses are based on five-wave panel data from “Natori City Life Recovery Population Panel Survey” (n = 316), which was conducted in Natori City, Miyagi Prefecture from the fourth to the tenth years after the GEJE. Cluster analys
APA, Harvard, Vancouver, ISO, and other styles
24

Sakamoto, Maiko, Salma Begum, and Tofayel Ahmed. "Vulnerabilities to COVID-19 in Bangladesh and a Reconsideration of Sustainable Development Goals." Sustainability 12, no. 13 (2020): 5296. http://dx.doi.org/10.3390/su12135296.

Full text
Abstract:
Bangladesh is one of the high-risk countries of the COVID-19 pandemic and its consequent losses due to social and economic conditions. There is a significant possibility that economic stagnation would push a large population back into poverty. In the present study, we have reviewed the chronology and epidemiology of COVID-19 in Bangladesh and investigated the country’s vulnerabilities concerning COVID-19 impacts. We focused primarily on four areas of vulnerabilities in Bangladesh: The garment industry, urban slums, social exclusion, and pre-existing health conditions. The result implicated tha
APA, Harvard, Vancouver, ISO, and other styles
25

Jin, Dun, Chengwan He, Quan Zou, Yan Qin, and Boshu Wang. "Source Code Vulnerability Detection Based on Joint Graph and Multimodal Feature Fusion." Electronics 14, no. 5 (2025): 975. https://doi.org/10.3390/electronics14050975.

Full text
Abstract:
Code vulnerability detection is a crucial approach to ensuring software security, aiming to automatically identify potential security vulnerabilities in source code. However, existing static vulnerability detection methods often face challenges such as feature loss and an insufficient expressive power when extracting program features. To address these issues, in this paper, we propose a source code vulnerability detection method based on joint graph and multimodal feature fusion. Innovatively, we construct a joint graph that integrates multiple program dependencies and semantic edges to achiev
APA, Harvard, Vancouver, ISO, and other styles
26

Saha, Ananya, and Narendra M. Dixit. "Pre-existing resistance in the latent reservoir can compromise VRC01 therapy during chronic HIV-1 infection." PLOS Computational Biology 16, no. 11 (2020): e1008434. http://dx.doi.org/10.1371/journal.pcbi.1008434.

Full text
Abstract:
Passive immunization with broadly neutralizing antibodies (bNAbs) of HIV-1 appears a promising strategy for eliciting long-term HIV-1 remission. When administered concomitantly with the cessation of antiretroviral therapy (ART) to patients with established viremic control, bNAb therapy is expected to prolong remission. Surprisingly, in clinical trials on chronic HIV-1 patients, the bNAb VRC01 failed to prolong remission substantially. Identifying the cause of this failure is important for improving VRC01-based therapies and unraveling potential vulnerabilities of other bNAbs. In the trials, vi
APA, Harvard, Vancouver, ISO, and other styles
27

Kjærgaard, Sofie Dalum, and Sarmila Chaudhary. "Lockdown as Amplifier." HIMALAYA 42, no. 1 (2023): 61–77. https://doi.org/10.2218/himalaya.2023.7482.

Full text
Abstract:
This article explores the amplification of challenges to sexual and reproductive healthcare provision during Nepal’s COVID-19 pandemic response and lockdown in 2020. In Nepal, the provision of essential primary healthcare is compromised by systemic weaknesses, infrastructure, and the economy. This includes healthcare and services supporting women’s sexual and reproductive health and rights (SRHR). During the pandemic, the government instituted a lockdown to control the spread of COVID-19. The government’s focus on controlling the disease, or on ‘pandemic preparedness’, amplified the pre-existi
APA, Harvard, Vancouver, ISO, and other styles
28

He, Zhenxiang, Yanling Liu, and Xiaohui Sun. "A Hybrid Semantic and Multi-Attention Mechanism Approach for Detecting Vulnerabilities in Smart Contract Code." Symmetry 17, no. 7 (2025): 1161. https://doi.org/10.3390/sym17071161.

Full text
Abstract:
Driven by blockchain technology, numerous industries are increasingly adopting smart contracts to enhance efficiency, reduce costs, and improve transparency. As a result, ensuring the security of smart contracts has become critical. Traditional detection methods often suffer from low efficiency, are prone to missing complex vulnerabilities, and have limited accuracy. Although deep learning approaches address some of these challenges, issues with both accuracy and efficiency remain in current solutions. To overcome these limitations, this paper proposes a symmetry-inspired solution that harmoni
APA, Harvard, Vancouver, ISO, and other styles
29

Qu, Sheng, Zheng Zhang, Bolin Ma, and Yuwen Shao. "Optimization Method of Web Fuzzy Test Cases Based on Genetic Algorithm." Journal of Physics: Conference Series 2078, no. 1 (2021): 012015. http://dx.doi.org/10.1088/1742-6596/2078/1/012015.

Full text
Abstract:
Abstract In order to solve the problems of low code coverage, few vulnerabilities found, and poor fuzzing effect caused by the small number of test cases and single types in Web fuzzing, on the basis of studying the current Web fuzzing methods, the existing fuzzing Web applications are tested Program research. A genetic algorithm-based method for optimizing fuzzing test cases for Web applications is proposed. It analyzes and counts the traffic of public network website business with Web service attack characteristics, and uses genetic algorithms to generate a large number of test cases with va
APA, Harvard, Vancouver, ISO, and other styles
30

Gak, Liza, Seyi Olojo, and Niloufar Salehi. "The Distressing Ads That Persist: Uncovering The Harms of Targeted Weight-Loss Ads Among Users with Histories of Disordered Eating." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–23. http://dx.doi.org/10.1145/3555102.

Full text
Abstract:
Targeted advertising can harm vulnerable groups when it targets individuals' personal and psychological vulnerabilities. We focus on how targeted weight-loss advertisements harm people with histories of disordered eating. We identify three features of targeted advertising that cause harm: the persistence of personal data that can expose vulnerabilities, over-simplifying algorithmic relevancy models, and design patterns encouraging engagement that can facilitate unhealthy behavior. Through a series of semi-structured interviews with individuals with histories of unhealthy body stigma, dieting,
APA, Harvard, Vancouver, ISO, and other styles
31

Topcu, Ahmet Ercan, Yehia Ibrahim Alzoubi, Ersin Elbasi, and Emre Camalan. "Social Media Zero-Day Attack Detection Using TensorFlow." Electronics 12, no. 17 (2023): 3554. http://dx.doi.org/10.3390/electronics12173554.

Full text
Abstract:
In the current information era, knowledge can pose risks in the online realm. It is imperative to proactively recognize potential threats, as unforeseen dangers cannot be eliminated entirely. Often, malware exploits and other emerging hazards are only identified after they have occurred. These types of risks are referred to as zero-day attacks since no pre-existing anti-malware measures are available to mitigate them. Consequently, significant damages occur when vulnerabilities in systems are exploited. The effectiveness of security systems, such as IPS and IDS, relies heavily on the prompt an
APA, Harvard, Vancouver, ISO, and other styles
32

Belsey-Priebe, Maryruth, Deborah Lyons, and Jonathan J. Buonocore. "COVID-19′s Impact on American Women’s Food Insecurity Foreshadows Vulnerabilities to Climate Change." International Journal of Environmental Research and Public Health 18, no. 13 (2021): 6867. http://dx.doi.org/10.3390/ijerph18136867.

Full text
Abstract:
The COVID-19 pandemic is wreaking havoc on human lives and the global economy, laying bare existing inequities, and galvanizing large numbers to call for change. Women are feeling the effects of this crisis more than others. This paper explores the pre-COVID relationships and amplified negative feedback loops between American women’s economic insecurity, lack of safety, and food insecurity. We then examine how COVID-19 is interacting with these intersecting risks and demonstrate how climate change will likely similarly intensify these feedback loops. The COVID-19 pandemic may be revealing vuln
APA, Harvard, Vancouver, ISO, and other styles
33

Anaoval, Abdul Aziz, Ahmad Turmudi Zy, and Suherman S. "Analysis of Manual and Automated Methods Effectiveness in Website Penetration Testing for Identifying SQL Injection Vulnerabilities." Journal of Computer Networks, Architecture and High Performance Computing 6, no. 3 (2024): 1204–12. http://dx.doi.org/10.47709/cnahpc.v6i3.4249.

Full text
Abstract:
This research aims to identify vulnerabilities to SQL Injection attacks on websites through penetration testing using quantitative and descriptive methods. In the current digital era, data and information security has become a crucial aspect. One of the frequent threats is SQL Injection attacks, where attackers insert malicious SQL commands into queries executed by web applications. This study utilizes tools such as Burp Suite to identify and exploit vulnerabilities in a login form created by the researchers. The research process begins with the Pre-Engagement Interactions phase, which include
APA, Harvard, Vancouver, ISO, and other styles
34

Nambundo, Jones Márcio, Otávio de Souza Martins Gomes, Adler Diniz de Souza, and Raphael Carlos Santos Machado. "Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review." Energies 18, no. 6 (2025): 1445. https://doi.org/10.3390/en18061445.

Full text
Abstract:
Smart meters are a vital part of the smart grid, enabling energy management, real-time control, and data collection. Despite advances in technology, there is still a lack of content and limited understanding of the specific cybersecurity threats facing these devices, as well as the effectiveness of existing mitigation strategies. This study analyzed 41 articles sourced from three academic databases (Scopus, Web of Science, and IEEE Xplore). A cutting-edge study was conducted, including a comprehensive review of relevant literature on smart meters, cybersecurity vulnerabilities, and mitigation
APA, Harvard, Vancouver, ISO, and other styles
35

Novaes Mathias, Tiago, Yoshihisa Sugimura, Tomoya Kawasaki, and Yasuhiro Akakura. "Topological Resilience of Shipping Alliances in Maritime Transportation Networks." Logistics 9, no. 1 (2025): 6. https://doi.org/10.3390/logistics9010006.

Full text
Abstract:
Background: The resilience of shipping alliances within the global maritime container network (GMCN) has critical implications for global trade. This study examines the topological robustness of strategic alliances (SAs) in liner shipping, focusing on their structural properties and responses to disruptions. Method: Using pre-2019 container vessel schedule data, we constructed a weighted node-edge network model of the GMCN. Centrality metrics were computed to identify critical nodes, and simulations were conducted to evaluate network robustness under random failures (RFs) and targeted attacks
APA, Harvard, Vancouver, ISO, and other styles
36

Lyu, Hengyu, Rosalba Minelli, Charles E. Deckard, et al. "Abstract LB079: Pancreatic clonal replica tumors display functional heterogeneity in response to KRAS pharmacological inhibition and reveal unique epigenetic vulnerabilities to overcome resistance." Cancer Research 82, no. 12_Supplement (2022): LB079. http://dx.doi.org/10.1158/1538-7445.am2022-lb079.

Full text
Abstract:
Abstract Introduction: Pre-existing tumor heterogeneity may allow tumors to escape treatment via selection and expansion of drug-resistant clones. Recent discovery of KRAS targeted therapies (e.g. SOS1i, KRASG12Ci, etc.) has dramatically changed the clinical outlook for patients with KRAS mutant tumors. Here, we generated and utilized pancreatic clonal replica tumors (CRTs) to identify drug-resistant clones of KRAS inhibitors (e.g. SOS1i and MEKi, KRASG12Di). Deep clonal characterization of KRAS inhibition revealed a novel epigenetic vulnerability which may inform on unbiased combination strat
APA, Harvard, Vancouver, ISO, and other styles
37

Siriwardhane, Pavithra, and Tehmina Khan. "The Gendered Nature of the Risk Factors of the COVID-19 Pandemic and Gender Equality: A Literature Review from a Vulnerability Perspective." Sustainability 13, no. 23 (2021): 13375. http://dx.doi.org/10.3390/su132313375.

Full text
Abstract:
The risk factors of COVID-19 are not gender-neutral but gendered. A vulnerability approach to pandemics suggests that females are more prone to risk exposure while there are inequalities in accessing resources and opportunities. These inequalities create a gendered pandemic vulnerability. The current article addresses the specific vulnerability on the gendered risk factors encountered by girls and women due to the gendered pandemic in a global context and their impacts on gender inequality. This study analyses the existing literature on the gendered pandemic and risk factors on females that le
APA, Harvard, Vancouver, ISO, and other styles
38

Jones, Angel, and Marwan Omar. "Codesentry: Revolutionizing Real-Time Software Vulnerability Detection With Optimized GPT Framework." Land Forces Academy Review 29, no. 1 (2024): 98–107. http://dx.doi.org/10.2478/raft-2024-0010.

Full text
Abstract:
Abstract The escalating complexity and sophistication of software vulnerabilities demand innovative approaches in cybersecurity. This study introduces a groundbreaking framework, named “CodeSentry”, employing a transformer-based model for vulnerability detection in software code. “CodeSentry” leverages a finely-tuned version of the Generative Pre-trained Transformer (GPT), optimized for pinpointing vulnerable code patterns across various benchmark datasets. This approach stands apart by its remarkable computational efficiency, making it suitable for real-time applications − a significant advan
APA, Harvard, Vancouver, ISO, and other styles
39

Ghai, Anita, and Suchaita Tenneti. "An Autoethnographic Reflection of COVID-19 and/as Biographical Disruption." Indian Journal of Gender Studies 31, no. 1 (2024): 43–60. http://dx.doi.org/10.1177/09715215231210537.

Full text
Abstract:
The COVID-19 pandemic and concomitant measures to mitigate it have exacerbated pre-existing social inequalities and have proven to be major disruptive phenomena at both individual and community levels. People with disabilities and chronic illnesses have been some of the most drastically impacted social groups during the pandemic whose isolation and vulnerabilities have often been compounded in the wake of the massive social upheaval. Through an autoethnographic account of a woman with a physical disability in India who has also survived polio, heart disease, cancer and COVID-19, this article c
APA, Harvard, Vancouver, ISO, and other styles
40

Dupéré, V., T. Leventhal, and É. Lacourse. "Neighborhood poverty and suicidal thoughts and attempts in late adolescence." Psychological Medicine 39, no. 8 (2008): 1295–306. http://dx.doi.org/10.1017/s003329170800456x.

Full text
Abstract:
BackgroundSuicide tends to concentrate in disadvantaged neighborhoods, and neighborhood disadvantage is associated with many important risk factors for youth suicide. However, no study has directly investigated the link between neighborhood poverty and youth suicidal behaviors, while controlling for pre-existing vulnerabilities. The objective of this study was to determine whether living in a poor neighborhood is associated with suicidal thoughts and attempts in late adolescence over and above background vulnerabilities, and whether this association can be explained by late-adolescence psychos
APA, Harvard, Vancouver, ISO, and other styles
41

Kerich, Emmy C., Naomy Chepchumba Aaron, Ruth Jeruiyot Kendagor, et al. "Socio‑Economic, Health and Ecosystems Vulnerabilities to Climate Change in Rural Areas in Kenya: Implications for Human Capacity Resilience." Prevention and Treatment of Natural Disasters 4, no. 1 (2025): 265–98. https://doi.org/10.54963/ptnd.v4i1.1249.

Full text
Abstract:
The recent decades have brought multiple studies of natural and social systems confirming climate change and its impact on the environment and human populations. Rural Kenya, home to 70% of the population and the backbone of its agrarian economy, is particularly susceptible due to its reliance on climate‑sensitive sectors. The study emerges from growing concerns about how recurring climate shocks perpetuate cycles of poverty, food insecurity and diminished adaptive capacity in rural communities, threatening Kenya’s sustainable development goals. Further, existing studies often address socio‑ec
APA, Harvard, Vancouver, ISO, and other styles
42

Rychetnik, Lucie, Peter Sainsbury, and Greg Stewart. "How Local Health Districts can prepare for the effects of climate change: an adaptation model applied to metropolitan Sydney." Australian Health Review 43, no. 6 (2019): 601. http://dx.doi.org/10.1071/ah18153.

Full text
Abstract:
Climate change adaptation can be defined as a form of risk management (i.e. assessing climate change-related risks and responding appropriately so that the risks can be pre-emptively minimised and managed as they arise). Adapting to climate change by hospital and community health services will entail responding to changing health needs of the local population, and to the likely effects of climate change on health service resources, workforce and infrastructure. In this paper we apply a model that health services can use to predict and respond to climate change risks and illustrate this with re
APA, Harvard, Vancouver, ISO, and other styles
43

Yu, Lei, Zhirong Huang, Hang Yuan, et al. "Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 182–205. https://doi.org/10.1145/3728878.

Full text
Abstract:
Smart contract vulnerability detection is a critical challenge in the rapidly evolving blockchain landscape. Existing vulnerability detection methods face two main issues: (1) Existing datasets lack comprehensiveness and sufficient quality, with limited vulnerability type coverage and insufficient distinction between high-quality and low-quality explanations for preference learning. (2) Large language models (LLMs) often struggle with accurately interpreting specific concepts in smart contract security. Through our empirical analysis, we found that even after continual pre-training and supervi
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Hang, Junhao Li, Yulong Wang, Chunru Zhou, and Mingyong Yin. "Leaving the Business Security Burden to LiSEA: A Low-Intervention Security Embedding Architecture for Business APIs." Applied Sciences 13, no. 21 (2023): 11784. http://dx.doi.org/10.3390/app132111784.

Full text
Abstract:
In the evolving landscape of complex business ecosystems and their digital platforms, an increasing number of business Application Programming Interfaces (APIs) are encountering challenges in ensuring optimal authorization control. This challenge arises due to factors such as programming errors, improper configurations, and sub-optimal business processes. While security departments have exhibited proficiency in identifying vulnerabilities and mitigating certain viral or adversarial incursions, the safeguarding of comprehensive business processes remains an intricate task. This paper introduces
APA, Harvard, Vancouver, ISO, and other styles
45

Md. Salman, Sohel, Sifullah Md. Khaled, and Riyad Raiyan Rahman. "Bangladesh Records World’s First HMPV Death: An Urgent Appeal for Health System Readiness in Low-Income Nations." DIU Journal of Health and Life Sciences 11, no. 02 (2025): 48–49. https://doi.org/10.36481/diujahs.v11i2.jy7g5h25.

Full text
Abstract:
I am reaching out to raise an alarm about the world’s first human metapneumovirus (HMPV) related death reported in Bangladesh highlighting an urgent global health concern on 16 January 2025 (Anadolu Agency, 2025). This 30-year-old woman with pre- existing health comorbidities is a harbinger of systemic vulnerabilities in basic healthcare delivery systems and -- this incident will be a wake-up call for low-income countries. HMPV's ability to cause severe respiratory infections, especially in at-risk groups such as young children, older adults, and those with chronic diseases, makes this case a
APA, Harvard, Vancouver, ISO, and other styles
46

Elugbadebo, Olufisayo O., Oluwagbemiga Oyinlola, Baiba Berzins, Bibilola Oladeji, Lisa M. Kuhns, and Babafemi O. Taiwo. "“Living Through Two Storms”: A Narrative Enquiry of Older Adults’ Experiences with HIV/AIDS During the COVID-19 Pandemic in Nigeria." Journal of Ageing and Longevity 5, no. 3 (2025): 23. https://doi.org/10.3390/jal5030023.

Full text
Abstract:
The COVID-19 pandemic has illuminated and intensified pre-existing structural vulnerabilities among older adults living with HIV/AIDS in sub-Saharan Africa, particularly Nigeria. Within already overstretched healthcare infrastructures, these individuals faced heightened economic precarity, disrupted HIV care, and pronounced psychosocial distress. Exploring their lived experiences critically advances an understanding of resilience and informs contextually responsive interventions that can mitigate future health crises. This study employed a narrative qualitative approach to explore the lived ex
APA, Harvard, Vancouver, ISO, and other styles
47

Hoffmann, Florian F., and Isadora d'Avila Lima Nery Gonçalves. "Border Regimes and Pandemic Law in Time of COVID-19: A View from Brazil." AJIL Unbound 114 (2020): 327–31. http://dx.doi.org/10.1017/aju.2020.65.

Full text
Abstract:
COVID-19 has had a profound impact on migrants and refugees the world over. Their pre-existing vulnerabilities were immediately exacerbated as national health systems were often overwhelmed and many disease control measures were either inaccessible to them or had disproportionate socio-economic effects. But migrants and refugees have also been framed as prima facie causes for the transboundary spread of the virus, and public health exception and derogation clauses in both national and international refugee and human rights instruments have been used to block their entry, suspend asylum process
APA, Harvard, Vancouver, ISO, and other styles
48

Bromet, E. J., L. Atwoli, N. Kawakami, et al. "Post-traumatic stress disorder associated with natural and human-made disasters in the World Mental Health Surveys." Psychological Medicine 47, no. 2 (2016): 227–41. http://dx.doi.org/10.1017/s0033291716002026.

Full text
Abstract:
BackgroundResearch on post-traumatic stress disorder (PTSD) following natural and human-made disasters has been undertaken for more than three decades. Although PTSD prevalence estimates vary widely, most are in the 20–40% range in disaster-focused studies but considerably lower (3–5%) in the few general population epidemiological surveys that evaluated disaster-related PTSD as part of a broader clinical assessment. The World Mental Health (WMH) Surveys provide an opportunity to examine disaster-related PTSD in representative general population surveys across a much wider range of sites than i
APA, Harvard, Vancouver, ISO, and other styles
49

Kim, Won-Bin, Su-Hyun Kim, Daehee Seo, and Im-Yeong Lee. "Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing." Wireless Communications and Mobile Computing 2021 (December 16, 2021): 1–16. http://dx.doi.org/10.1155/2021/1567019.

Full text
Abstract:
Broadcast proxy reencryption (BPRE), which combines broadcast encryption (BE) and proxy reencryption (PRE), is a technology used for the redistribution of data uploaded on the cloud to multiple users. BPRE reencrypts data encrypted by the distributor and then uploads it to the cloud into a ciphertext that at a later stage targets multiple recipients. As a result of this, flexible data sharing is possible for multiple recipients. However, various inefficiencies and vulnerabilities of the BE, such as the recipient anonymity problem and the key escrow problem, also creep into BPRE. Our aim in thi
APA, Harvard, Vancouver, ISO, and other styles
50

Dharmalingam, Jeya Mala, and M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks." International Journal of Intelligent Information Technologies 14, no. 3 (2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.

Full text
Abstract:
This article describes how software vulnerability analysis and testing for web applications should detect not only the common attacks but also dynamic vulnerability attacks. These are the attacks such as structured query language injection attacks (SQLIAs) which will extract the most crucial user information from the targeted database. In this proposed approach, an intelligent agent namely intelligent vulnerability analyzer agent (IVA) is proposed in which the external attacks due to dynamic user inputs are identified using a heuristic-guided intelligent graph searching and then a pre and post
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!