Skip to results
1-20 of 918
Keywords: attack
Sort by
Journal Article
Household Transmission and Genomic Diversity of Respiratory Syncytial Virus (RSV) in the United States, 2022–2023
Get access
Sarah N Cox and others
Clinical Infectious Diseases, ciaf048, https://doi.org/10.1093/cid/ciaf048
Published: 14 March 2025
... household transmission secondary attack rate genomics community surveillance Centers for Disease Control and Prevention 10.13039/100000030 75D30121C12297 Households are an important setting for the spread of respiratory viruses and provide an important framework to understand risk factors for viral...
Journal Article
Association between cerebral small vessel disease and periodic limb movements of sleep in patients with stroke/TIA
Get access
Matthew R Veitch and others
in
Sleep
Sleep, Volume 48, Issue 4, April 2025, zsaf027, https://doi.org/10.1093/sleep/zsaf027
Published: 04 February 2025
..., accounting for comorbidities. Methods Patients with first-ever stroke or transient ischemic attack (TIA) were retrospectively analyzed. Polysomnography assessed the PLM index (PLMI) and PLM arousal index (PLMAI). CSVD was measured using radiographic markers, including the Fazekas score, total age-related...
Journal Article
Measuring the size and severity of the integrated cyber attack surface across US county governments
Charles Harry and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyae032, https://doi.org/10.1093/cybsec/tyae032
Published: 17 January 2025
..., and evaluate the cyber attack surface of US county governments prevent the full estimation of the importance of local government cybersecurity to national resilience. Our study aims to address this gap. We further develop existing OSINT-based methodologies to measure the attack surface and assess the size...
Journal Article
Host-seeking and exophilic-endophilic activities of Culicoides spp. (Diptera: Ceratopogonidae) with notes on two trapping methods
Get access
Shuddhasattwa Maitra Mazumdar and others
Journal of Medical Entomology, Volume 62, Issue 2, March 2025, Pages 416–427, https://doi.org/10.1093/jme/tjae160
Published: 09 January 2025
...:https://dbpia.nl.go.kr/pages/standard-publication-reuse-rights ) Abstract Host-seeking behavior of Culicoides species was examined from 2018 to 2019 in West Bengal, India, which elucidated diel activity, feeding success, attack rate, biting rate, and preferential landing of adult Culicoides...
Journal Article
Transient speech impairment: a minor stroke/TIA case escaping conventional imaging methods
Sheharyar H Khan and Mustafa Aljanabi
Oxford Medical Case Reports, Volume 2024, Issue 10, October 2024, omae119, https://doi.org/10.1093/omcr/omae119
Published: 15 October 2024
.../ ). Abstract This case report discusses the diagnostic challenges posed by transient ischaemic attacks (TIAs) and minor strokes presenting with atypical symptoms, focusing on a 62-year-old male presenting with isolated speech difficulties reminiscent of Broca’s aphasia. Despite initial inconclusive imaging...
Journal Article
Severe Acute Respiratory Syndrome Coronavirus 2 Household Transmission During the Omicron Era in Massachusetts: A Prospective, Case-Ascertained Study Using Genomic Epidemiology
Jaspreet Banga and others
Open Forum Infectious Diseases, Volume 11, Issue 11, November 2024, ofae591, https://doi.org/10.1093/ofid/ofae591
Published: 07 October 2024
... attack rate (SAR) for contacts was 39%. We further examined a strict analysis set of 21 households that had only 1 PCR-positive case at baseline, finding an SAR of 22.5%. Genomic epidemiology further determined that there were multiple sources of infection for household contacts, including the index case...
Journal Article
How Do Consumers React to Ads That Meddle in Out-Party Primaries?
Get access
Mohamed A Hussein and others
Journal of Consumer Research, Volume 51, Issue 6, April 2025, Pages 1186–1208, https://doi.org/10.1093/jcr/ucae039
Published: 04 July 2024
... 2000 ; Jain, Agrawal, and Maheswaran 2006 ; Jain and Posavac 2004 ; Jain et al. 2007 ). In politics, negative ads are referred to as “attack ads” and involve derogation of political opponents ( Lau and Rovner 2009 ). Meddle ads differ from attack ads in three ways: intentions, target, and timing...
Journal Article
Epidemiology of Household Transmission of COVID-19 among Patients Attending Outpatient Clinics of Teaching Hospital in Cairo, Egypt
Get access
Dalia F Ali and others
QJM: An International Journal of Medicine, Volume 117, Issue Supplement_1, June 2024, hcae070.556, https://doi.org/10.1093/qjmed/hcae070.556
Published: 03 July 2024
.... Aim to identify the epidemiological features of household transmission in a sample of patients attending the family medicine clinic of a tertiary hospital in Egypt, and to calculate the household COVID19 secondary clinical attack rate for the recruited patients. Materials and Methods...
Journal Article
Hybrid spatial network disintegration strategy considering geographic and topological information
Get access
Lin Ran and others
Journal of Complex Networks, Volume 12, Issue 4, August 2024, cnae025, https://doi.org/10.1093/comnet/cnae025
Published: 24 June 2024
... circle. If the spatial network disintegration strategy includes the ith candidate disintegration circle, then xi = 1; otherwise, xi = 0. We can have K = ∑ i = 1 S x i , when the number of localized attacks in spatial network...
Journal Article
EDITOR'S CHOICE
Xylitol is prothrombotic and associated with cardiovascular risk
Get access
Marco Witkowski and others
European Heart Journal, Volume 45, Issue 27, 14 July 2024, Pages 2439–2452, https://doi.org/10.1093/eurheartj/ehae244
Published: 06 June 2024
... responsiveness and thrombosis potential in vivo. ADP, adenosine diphosphate; MI, myocardial infarction. Artificial sweetener Low-calorie sweetener Cardiovascular disease Platelet Thrombosis Heart attack Stroke Sugar alcohol Polyol Nutrition NIH 10.13039/100000002 Office of Dietary...
Journal Article
Household Transmission and Clinical Features of Respiratory Tract Infections That Were SARS-CoV-2 Positive and Negative
Jaakko Ahti and others
The Journal of Infectious Diseases, Volume 230, Issue 4, 15 October 2024, Pages e837–e846, https://doi.org/10.1093/infdis/jiae278
Published: 31 May 2024
...). children COVID-19 household transmission SARS-CoV-2 secondary attack rate Specified Government Transfers Hospital District of Southwest Finland 10.13039/501100009420 Government Research Foundation Satakunta Hospital District Paulo Foundation 10.13039/501100007417...
Journal Article
The Risk of SARS-CoV-2 Transmission in Community Indoor Settings: A Systematic Review and Meta-analysis
Mark Rohit Francis and others
The Journal of Infectious Diseases, Volume 230, Issue 4, 15 October 2024, Pages e824–e836, https://doi.org/10.1093/infdis/jiae261
Published: 16 May 2024
..., summary evidence on the transmission risks in settings other than households, schools, elderly care, and health care facilities is limited. We conducted a systematic review to estimate the secondary attack rates (SARs) of SARS-CoV-2 and the factors modifying transmission risk in community indoor settings...
Journal Article
Attack principles in sequent-based argumentation theory
Get access
Esther Anna Corsi
Journal of Logic and Computation, Volume 35, Issue 3, April 2025, exad080, https://doi.org/10.1093/logcom/exad080
Published: 15 April 2024
... of the Oxford University Press, Standard Journals Publication Model ( https://dbpia.nl.go.kr/pages/standard-publication-reuse-rights ) Abstract Attack principles have been introduced in semi-abstract argumentation frameworks and, in the present work, we interpret them in sequent-based argumentation...
Journal Article
Quantum-inspired analysis of neural network vulnerabilities: the role of conjugate variables in system attacks
Jun-Jie Zhang and Deyu Meng
National Science Review, Volume 11, Issue 9, September 2024, nwae141, https://doi.org/10.1093/nsr/nwae141
Published: 11 April 2024
..., non-random perturbations, emerging as adversarial attacks. Such attacks, born from the gradient of the loss function relative to the input, are discerned as input conjugates, revealing a systemic fragility within the network structure. Intriguingly, a mathematical congruence manifests between...
Journal Article
Liveness Attacks On HotStuff: The Vulnerability Of Timer Doubling Mechanism
Get access
Kaiwen Guo and others
The Computer Journal, Volume 67, Issue 8, August 2024, Pages 2586–2600, https://doi.org/10.1093/comjnl/bxae027
Published: 05 April 2024
... observe that the adversary can disrupt the view synchronization and launch a liveness attack, stalling the confirmation process. Besides, the adversary can further recover or control the confirmation process at will. A repairment that retains the desirable feature of HotStuff is also presented...
Journal Article
Towards enhanced monitoring framework with smart predictions
Antonello Calabrò and others
Logic Journal of the IGPL, Volume 32, Issue 2, April 2024, Pages 321–333, https://doi.org/10.1093/jigpal/jzae010
Published: 16 March 2024
... be defined, keeping the human in the loop. RG5: Including failure prediction methods. The SMF should include means for either smart prediction of malicious attacks or misbehavior or for anticipating evaluating functional or non-functional properties. RG6: Common Vocabulary and Knowledge Management...
Journal Article
An unusual presentation of takotsubo syndrome in an elderly patient
Israr Khan and Adam Atoot
Oxford Medical Case Reports, Volume 2024, Issue 2, February 2024, omad144, https://doi.org/10.1093/omcr/omad144
Published: 16 February 2024
... are as shown in Table 1 . Electrocardiogram (ECG) on arrival showed minimal ST elevation with inverted T waves in leads V2 and V3 shown in Fig. 1 . Initial working diagnoses were stroke/transient ischemic attack, along with acute anteroseptal wall myocardial ischemia/infarction. A computed tomography scan...
Journal Article
A systematic literature review on advanced persistent threat behaviors and its detection strategy
Nur Ilzam Che Mat and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyad023, https://doi.org/10.1093/cybsec/tyad023
Published: 02 January 2024
... attack-related behaviors. We adhered to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines and conducted an extensive search of a variety of databases. A total of 45 studies, encompassing sources from both academia and the industry, were considered in the final...
Journal Article
Exploring the effectiveness of node attacks based on combined centrality measures in scale-free networks
Get access
P B Divya and others
Journal of Complex Networks, Volume 11, Issue 6, December 2023, cnad047, https://doi.org/10.1093/comnet/cnad047
Published: 12 December 2023
... criteria, making it a more comprehensive measure of node importance. Overall, these studies demonstrate the importance of considering different types of attacks and centrality measures when analysing the robustness and vulnerability of complex networks. The use of combined centrality measures...
Journal Article
Household Transmission of Mpox to Children and Adolescents, California, 2022
Kristen A Wendorf and others
The Journal of Infectious Diseases, Volume 229, Issue Supplement_2, 15 April 2024, Pages S203–S206, https://doi.org/10.1093/infdis/jiad448
Published: 13 October 2023
... the original work is properly cited. Abstract Background In California, the 2022 mpox outbreak cumulated 5572 cases, 20% of US cases, as of November 28, 2022; 0.3% of cases were among children <16 years old. The secondary attack rate (SAR) for children sharing households with infected adults is unknown...
Advertisement
Advertisement