Journal articles on the topic 'Pre-existing vulnerabilities'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Pre-existing vulnerabilities.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
van Zuiden, Mirjam, Annemieke Kavelaars, Elbert Geuze, Miranda Olff, and Cobi J. Heijnen. "Predicting PTSD: Pre-existing vulnerabilities in glucocorticoid-signaling and implications for preventive interventions." Brain, Behavior, and Immunity 30 (May 2013): 12–21. http://dx.doi.org/10.1016/j.bbi.2012.08.015.
Full textCabin, William. "Pre-Existing Inequality: The Impact of COVID-19 on Medicare Home Health Beneficiaries." Home Health Care Management & Practice 33, no. 2 (2021): 130–36. http://dx.doi.org/10.1177/1084822321992380.
Full textZhang, Jie, Gehao Lu, and Jia Yu. "A Smart Contract Vulnerability Detection Method Based on Heterogeneous Contract Semantic Graphs and Pre-Training Techniques." Electronics 13, no. 18 (2024): 3786. http://dx.doi.org/10.3390/electronics13183786.
Full textSchweizerhof, Margarete, Zechser Adrian, and Artur Mueller. "Effects of the measures to contain the Covid-19 pandemic on pre-existing mental vulnerabilities and disorders." SCENTIA International Economic Review 1, no. 2 (2022): 11–35. http://dx.doi.org/10.52514/sier.v1i2.25.
Full textSekalala, Sharifah, Katrina Perehudoff, Michael Parker, Lisa Forman, Belinda Rawson, and Maxwell Smith. "An intersectional human rights approach to prioritising access to COVID-19 vaccines." BMJ Global Health 6, no. 2 (2021): e004462. http://dx.doi.org/10.1136/bmjgh-2020-004462.
Full textKuz, Antonieta. "Educational technological inequalities expressed during confinement by COVID19." EDMETIC 11, no. 2 (2022): 5. http://dx.doi.org/10.21071/edmetic.v11i2.13657.
Full textCetin, Ronay, Eva Quandt, and Manuel Kaulich. "Functional Genomics Approaches to Elucidate Vulnerabilities of Intrinsic and Acquired Chemotherapy Resistance." Cells 10, no. 2 (2021): 260. http://dx.doi.org/10.3390/cells10020260.
Full textArmingeon, Klaus, Caroline de la Porte, Elke Heins, and Stefano Sacchi. "Voices from the past: economic and political vulnerabilities in the making of next generation EU." Comparative European Politics 20, no. 2 (2022): 144–65. http://dx.doi.org/10.1057/s41295-022-00277-6.
Full textLewis, Stephanie J., Karestan C. Koenen, Antony Ambler, et al. "Unravelling the contribution of complex trauma to psychopathology and cognitive deficits: a cohort study." British Journal of Psychiatry 219, no. 2 (2021): 448–55. http://dx.doi.org/10.1192/bjp.2021.57.
Full textMeyers, Benjamin S., Sultan Fahad Almassari, Brandon N. Keller, and Andrew Meneely. "Examining Penetration Tester Behavior in the Collegiate Penetration Testing Competition." ACM Transactions on Software Engineering and Methodology 31, no. 3 (2022): 1–25. http://dx.doi.org/10.1145/3514040.
Full textAkacha, Souheil Abdel-Latif, and Ali Ismail Awad. "Enhancing Security and Sustainability of e-Learning Software Systems: A Comprehensive Vulnerability Analysis and Recommendations for Stakeholders." Sustainability 15, no. 19 (2023): 14132. http://dx.doi.org/10.3390/su151914132.
Full textOgunlesi, A. O., and E. O. Akande. "Mental illness in the medical profession: Nigeria in the world." Psychiatric Bulletin 16, no. 8 (1992): 502–3. http://dx.doi.org/10.1192/pb.16.8.502.
Full textGao, Gaimei, Zilu Li, Lizhong Jin, Chunxia Liu, Junji Li, and Xiangqi Meng. "RTMS: A Smart Contract Vulnerability Detection Method Based on Feature Fusion and Vulnerability Correlations." Electronics 14, no. 4 (2025): 768. https://doi.org/10.3390/electronics14040768.
Full textJamaluddin, Jamil, Fazrun Zaini, Abubakr Elamin Abdalla, and Nurulhuda Firdaus Mohd Azmi. "Pre and Post Seismic Assessment for an Onshore Oil and Gas Facility in Sabah." Semarak Proceedings of Applied Sciences and Engineering Technology 1, no. 1 (2025): 144–52. https://doi.org/10.37934/spaset.1.1.144152a.
Full textVarickanickal, Joann, and K. Bruce Newbold. "Extreme heat events and health vulnerabilities among immigrant and newcomer populations." Environmental Health Review 64, no. 2 (2021): 28–34. http://dx.doi.org/10.5864/d2021-011.
Full textJoe, Yeonjik, and Minjeong Kim. "Analysis of trends in domestic and international research on educational use of chatbots: systematic literature review." Institute of Educational Research Chonnam National University 45, no. 3 (2023): 1–32. http://dx.doi.org/10.35510/jer.2023.45.3.1.
Full textZhao, Zheng, Tianhao Zhang, Xiaoya Fan, Qian Mao, Dafeng Wang, and Qi Zhao. "GMN+: A Binary Homologous Vulnerability Detection Method Based on Graph Matching Neural Network with Enhanced Attention." Applied Sciences 14, no. 22 (2024): 10762. http://dx.doi.org/10.3390/app142210762.
Full textBarr, Makenzie L., Courtney Martin, Courtney Luecking, and Kathryn Cardarelli. "Losses, Gains, and Changes to the Food Environment in a Rural Kentucky County during the COVID-19 Pandemic." Nutrients 13, no. 11 (2021): 3929. http://dx.doi.org/10.3390/nu13113929.
Full textWang, Heping, Augustin Luna, Gonghong Yan, et al. "Abstract 1002: Targeting adaptation to cancer treatment by drug combinations." Cancer Research 82, no. 12_Supplement (2022): 1002. http://dx.doi.org/10.1158/1538-7445.am2022-1002.
Full textCharnley, Gina E. C., Sebastian Yennan, Chinwe Ochu, Ilan Kelman, Katy A. M. Gaythorpe, and Kris A. Murray. "The impact of social and environmental extremes on cholera time varying reproduction number in Nigeria." PLOS Global Public Health 2, no. 12 (2022): e0000869. http://dx.doi.org/10.1371/journal.pgph.0000869.
Full textLuna, Augustin, Heping Wang, Gonghong Yan, et al. "Abstract 1759: Targeting adaptation to cancer treatment by drug combinations." Cancer Research 83, no. 7_Supplement (2023): 1759. http://dx.doi.org/10.1158/1538-7445.am2023-1759.
Full textLewis, Stephanie J., Karestan C. Koenen, Antony Ambler, et al. "Psychopathology and cognitive deficits in young people exposed to complex trauma." BJPsych Open 7, S1 (2021): S36—S37. http://dx.doi.org/10.1192/bjo.2021.149.
Full textFujimoto, Shinya, Fuminori Kawami, Anna Matsukawa, Shosuke Sato, and Shigeo Tatsuki. "Pre-Existing Inequalities, Post-Event Social Environmental Changes, and Long-Term Trajectories of Life Recovery: Findings from Five-Wave Natori City Life Recovery Panel Survey." Journal of Disaster Research 17, no. 2 (2022): 207–16. http://dx.doi.org/10.20965/jdr.2022.p0207.
Full textSakamoto, Maiko, Salma Begum, and Tofayel Ahmed. "Vulnerabilities to COVID-19 in Bangladesh and a Reconsideration of Sustainable Development Goals." Sustainability 12, no. 13 (2020): 5296. http://dx.doi.org/10.3390/su12135296.
Full textJin, Dun, Chengwan He, Quan Zou, Yan Qin, and Boshu Wang. "Source Code Vulnerability Detection Based on Joint Graph and Multimodal Feature Fusion." Electronics 14, no. 5 (2025): 975. https://doi.org/10.3390/electronics14050975.
Full textSaha, Ananya, and Narendra M. Dixit. "Pre-existing resistance in the latent reservoir can compromise VRC01 therapy during chronic HIV-1 infection." PLOS Computational Biology 16, no. 11 (2020): e1008434. http://dx.doi.org/10.1371/journal.pcbi.1008434.
Full textKjærgaard, Sofie Dalum, and Sarmila Chaudhary. "Lockdown as Amplifier." HIMALAYA 42, no. 1 (2023): 61–77. https://doi.org/10.2218/himalaya.2023.7482.
Full textHe, Zhenxiang, Yanling Liu, and Xiaohui Sun. "A Hybrid Semantic and Multi-Attention Mechanism Approach for Detecting Vulnerabilities in Smart Contract Code." Symmetry 17, no. 7 (2025): 1161. https://doi.org/10.3390/sym17071161.
Full textQu, Sheng, Zheng Zhang, Bolin Ma, and Yuwen Shao. "Optimization Method of Web Fuzzy Test Cases Based on Genetic Algorithm." Journal of Physics: Conference Series 2078, no. 1 (2021): 012015. http://dx.doi.org/10.1088/1742-6596/2078/1/012015.
Full textGak, Liza, Seyi Olojo, and Niloufar Salehi. "The Distressing Ads That Persist: Uncovering The Harms of Targeted Weight-Loss Ads Among Users with Histories of Disordered Eating." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–23. http://dx.doi.org/10.1145/3555102.
Full textTopcu, Ahmet Ercan, Yehia Ibrahim Alzoubi, Ersin Elbasi, and Emre Camalan. "Social Media Zero-Day Attack Detection Using TensorFlow." Electronics 12, no. 17 (2023): 3554. http://dx.doi.org/10.3390/electronics12173554.
Full textBelsey-Priebe, Maryruth, Deborah Lyons, and Jonathan J. Buonocore. "COVID-19′s Impact on American Women’s Food Insecurity Foreshadows Vulnerabilities to Climate Change." International Journal of Environmental Research and Public Health 18, no. 13 (2021): 6867. http://dx.doi.org/10.3390/ijerph18136867.
Full textAnaoval, Abdul Aziz, Ahmad Turmudi Zy, and Suherman S. "Analysis of Manual and Automated Methods Effectiveness in Website Penetration Testing for Identifying SQL Injection Vulnerabilities." Journal of Computer Networks, Architecture and High Performance Computing 6, no. 3 (2024): 1204–12. http://dx.doi.org/10.47709/cnahpc.v6i3.4249.
Full textNambundo, Jones Márcio, Otávio de Souza Martins Gomes, Adler Diniz de Souza, and Raphael Carlos Santos Machado. "Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review." Energies 18, no. 6 (2025): 1445. https://doi.org/10.3390/en18061445.
Full textNovaes Mathias, Tiago, Yoshihisa Sugimura, Tomoya Kawasaki, and Yasuhiro Akakura. "Topological Resilience of Shipping Alliances in Maritime Transportation Networks." Logistics 9, no. 1 (2025): 6. https://doi.org/10.3390/logistics9010006.
Full textLyu, Hengyu, Rosalba Minelli, Charles E. Deckard, et al. "Abstract LB079: Pancreatic clonal replica tumors display functional heterogeneity in response to KRAS pharmacological inhibition and reveal unique epigenetic vulnerabilities to overcome resistance." Cancer Research 82, no. 12_Supplement (2022): LB079. http://dx.doi.org/10.1158/1538-7445.am2022-lb079.
Full textSiriwardhane, Pavithra, and Tehmina Khan. "The Gendered Nature of the Risk Factors of the COVID-19 Pandemic and Gender Equality: A Literature Review from a Vulnerability Perspective." Sustainability 13, no. 23 (2021): 13375. http://dx.doi.org/10.3390/su132313375.
Full textJones, Angel, and Marwan Omar. "Codesentry: Revolutionizing Real-Time Software Vulnerability Detection With Optimized GPT Framework." Land Forces Academy Review 29, no. 1 (2024): 98–107. http://dx.doi.org/10.2478/raft-2024-0010.
Full textGhai, Anita, and Suchaita Tenneti. "An Autoethnographic Reflection of COVID-19 and/as Biographical Disruption." Indian Journal of Gender Studies 31, no. 1 (2024): 43–60. http://dx.doi.org/10.1177/09715215231210537.
Full textDupéré, V., T. Leventhal, and É. Lacourse. "Neighborhood poverty and suicidal thoughts and attempts in late adolescence." Psychological Medicine 39, no. 8 (2008): 1295–306. http://dx.doi.org/10.1017/s003329170800456x.
Full textKerich, Emmy C., Naomy Chepchumba Aaron, Ruth Jeruiyot Kendagor, et al. "Socio‑Economic, Health and Ecosystems Vulnerabilities to Climate Change in Rural Areas in Kenya: Implications for Human Capacity Resilience." Prevention and Treatment of Natural Disasters 4, no. 1 (2025): 265–98. https://doi.org/10.54963/ptnd.v4i1.1249.
Full textRychetnik, Lucie, Peter Sainsbury, and Greg Stewart. "How Local Health Districts can prepare for the effects of climate change: an adaptation model applied to metropolitan Sydney." Australian Health Review 43, no. 6 (2019): 601. http://dx.doi.org/10.1071/ah18153.
Full textYu, Lei, Zhirong Huang, Hang Yuan, et al. "Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 182–205. https://doi.org/10.1145/3728878.
Full textLi, Hang, Junhao Li, Yulong Wang, Chunru Zhou, and Mingyong Yin. "Leaving the Business Security Burden to LiSEA: A Low-Intervention Security Embedding Architecture for Business APIs." Applied Sciences 13, no. 21 (2023): 11784. http://dx.doi.org/10.3390/app132111784.
Full textMd. Salman, Sohel, Sifullah Md. Khaled, and Riyad Raiyan Rahman. "Bangladesh Records World’s First HMPV Death: An Urgent Appeal for Health System Readiness in Low-Income Nations." DIU Journal of Health and Life Sciences 11, no. 02 (2025): 48–49. https://doi.org/10.36481/diujahs.v11i2.jy7g5h25.
Full textElugbadebo, Olufisayo O., Oluwagbemiga Oyinlola, Baiba Berzins, Bibilola Oladeji, Lisa M. Kuhns, and Babafemi O. Taiwo. "“Living Through Two Storms”: A Narrative Enquiry of Older Adults’ Experiences with HIV/AIDS During the COVID-19 Pandemic in Nigeria." Journal of Ageing and Longevity 5, no. 3 (2025): 23. https://doi.org/10.3390/jal5030023.
Full textHoffmann, Florian F., and Isadora d'Avila Lima Nery Gonçalves. "Border Regimes and Pandemic Law in Time of COVID-19: A View from Brazil." AJIL Unbound 114 (2020): 327–31. http://dx.doi.org/10.1017/aju.2020.65.
Full textBromet, E. J., L. Atwoli, N. Kawakami, et al. "Post-traumatic stress disorder associated with natural and human-made disasters in the World Mental Health Surveys." Psychological Medicine 47, no. 2 (2016): 227–41. http://dx.doi.org/10.1017/s0033291716002026.
Full textKim, Won-Bin, Su-Hyun Kim, Daehee Seo, and Im-Yeong Lee. "Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing." Wireless Communications and Mobile Computing 2021 (December 16, 2021): 1–16. http://dx.doi.org/10.1155/2021/1567019.
Full textDharmalingam, Jeya Mala, and M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks." International Journal of Intelligent Information Technologies 14, no. 3 (2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.
Full text