Showing 2,021 - 2,040 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 2021

    ‘We are not trained to do clinical work’: security staff providing physical restraint for NGT feeding in English paediatric wards—a qualitative multi-informant study by Dasha Nicholls, Jacinta Tan, Sarah Fuller, Emerie Sheridan

    Published 2024-12-01
    “…Objective To gain insights into the experience, and impact, of using security staff to facilitate physical restraints for nasogastric tube feeding.Design A cross-sectional design using 39 individual interviews, three online focus groups and three written submissions involving young people with lived experience (PWLE), parents/carers, paediatric staff and security staff involved in nasogastric feeding under restraint in paediatric settings in England. …”
    Get full text
    Article
  2. 2022
  3. 2023
  4. 2024
  5. 2025
  6. 2026
  7. 2027

    From pyramid to pillar : population change and social security in Europe.

    Published 1989
    Subjects: “…Social security Europe. 10386…”
    View in OPAC
    Book
  8. 2028
  9. 2029
  10. 2030
  11. 2031
  12. 2032
  13. 2033
  14. 2034
  15. 2035

    The Evaluative Process Model of Objectification: how men's evaluations of patriarchal security and women's fit with conventional beauty and sexuality norms interact to predict perpetration of sexually objectifying behaviors by Gemma Sáez, Abigail R. Riemer, Olivier Klein, Sarah J. Gervais

    Published 2025-01-01
    “…Among men who endorse patriarchal ideologies, perceived patriarchy threat or security is theorized to interact with evaluations of female targets to predict whether objectifying perceptions of female targets result in benevolent, derogative, or dismissive objectifying behaviors. …”
    Get full text
    Article
  16. 2036

    A Scalable Approach to Internet of Things and Industrial Internet of Things Security: Evaluating Adaptive Self-Adjusting Memory K-Nearest Neighbor for Zero-Day Attack Detection by Promise Ricardo Agbedanu, Shanchieh Jay Yang, Richard Musabe, Ignace Gatare, James Rwigema

    Published 2025-01-01
    “…This study confirms the feasibility of Adaptive SAMKNN as a real-time, scalable, and memory-efficient solution for IoT and IIoT security, providing reliable anomaly detection without overwhelming computational resources. …”
    Get full text
    Article
  17. 2037

    Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach by Li Zhao, Wei Li, Yajie Li

    Published 2022-01-01
    “…Second, a non-linear CPS dual security control framework that integrates active-passive attack tolerance for DoS attack and active fault tolerance for actuator fault is constructed. …”
    Get full text
    Article
  18. 2038
  19. 2039
  20. 2040

    Data access control policy of encrypted deduplication system by Chunfu JIA, Guanxiong HA, Ruiqi LI

    Published 2020-05-01
    Subjects: “…update of security policy…”
    Get full text
    Article