Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,202,391 papers from all fields of science
Search
Sign In
Create Free Account
Attack rate
Known as:
Attack ratio
In epidemiology, the attack rate is the biostatistical measure of frequency of morbidity, or speed of spread, in an at risk population. It is used in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Broader (2)
Bioinformatics
Biostatistics
Risk assessment
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Extended Statistical Analysis on Multimedia Concealed Data Detections
Rupa Chiramdasu
Ingénierie des Systèmes d Inf.
2019
Corpus ID: 201138769
Received: 4 January 2019 Accepted: 10 March 2019 Nowadays, providing privacy and protection to illicit materials like videos and…
Expand
2016
2016
Insecticide Dip Treatments to Prevent Walnut Twig Beetle Colonization of Black Walnut Logs
Jackson P. Audley
,
Adam M. Taylor
,
W. Klingeman
,
A. Mayfield
,
S. Myers
2016
Corpus ID: 46639385
Abstract The health, sustainability, and commercial viability of eastern black walnut (Juglans nigra) are currently under threat…
Expand
2016
2016
On the scalability and effectiveness of a cache pollution based DoS attack in information centric networks
Jeffery Gouge
,
A. Seetharam
,
Swapnoneel Roy
International Conference on Computing, Networking…
2016
Corpus ID: 11671076
With the exponential growth of content, the Internet is undergoing a transformation from a host-centric approach to a content…
Expand
2015
2015
Trusted Routing with an Efficient Certificate Revocation for Mobile Ad Hoc Network
R. Yasodharan
,
P. Devendran
2015
Corpus ID: 46334954
Connecting through mobile increased steeply in last few years. Hence the necessary for secured communication is also given higher…
Expand
2015
2015
American Water Willow Mediates Survival and Antipredator Behavior of Juvenile Largemouth Bass
Kristopher J. Stahr
,
D. Shoup
2015
Corpus ID: 59158621
AbstractState and federal agencies typically introduce aquatic vegetation to increase the recruitment of sport fishes…
Expand
2014
2014
A clusterized firewall framework for cloud computing
Meng Liu
,
Wanchun Dou
,
Shui Yu
,
Zhensheng Zhang
IEEE International Conference on Communications…
2014
Corpus ID: 2670117
Cloud computing is becoming popular as the next infrastructure of computing platform. However, with data and business…
Expand
2010
2010
New methodology and code for Hawker 800XP aircraft stability derivatives calculation from geometrical data
N. Anton
,
R. Botez
,
D. Popescu
Aeronautical Journal
2010
Corpus ID: 55231761
Abstract The new FDerivatives code was conceived and developed for calculating static and dynamic stability derivatives of an…
Expand
2008
2008
On the Effects of Diversity on Intrusion Tolerance
A. Bessani
,
R. Obelheiro
,
Paulo Sousa
,
I. Gashi
2008
Corpus ID: 54141544
The security gains of intrusion-tolerant systems are directly dependent on the assumption that system components fail…
Expand
2007
2007
Larval feeding behavior and ant association in frosted elfin, Callophrys irus (Lycaenidae)
G. Albanese
,
M. W. Nelson
,
P. Vickery
,
P. Sievert
2007
Corpus ID: 17620862
Callophrys irus is a rare and declining lycaenid found in the eastern U.S., inhabiting xeric and open habitats maintained by…
Expand
1999
1999
Parasites Face a Perpetual Dilemma
J. Lederberg
1999
Corpus ID: 13841320
NOTE: Article was the second of a three-part series on infectious diseases and the second of two articles adapted from the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE