fetal vulnerability

Known as: fetus vulnerability 
 
National Institutes of Health

Topic mentions per year

Topic mentions per year

1992-2017
01219922017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Vulnerability assessment (VA) is a well established method for determining security weaknesses within a system. The VA process is… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table 1
Is this relevant?
2017
2017
Cross-Site Scripting (XSS) is the most prevalent web application vulnerability that occurs when a web application implements… (More)
Is this relevant?
2014
2014
The mitigation of seismic vulnerability related to both cultural and historical buildings is a very important issue especially… (More)
Is this relevant?
2013
2013
Web applications vulnerabilities allow attackers to perform malicious actions that range from gaining unauthorized account access… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2011
2011
This study developed a new framework to quantify spatial vulnerability for sustainable water resources management. Four… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2010
2010
Since its inception in 2004 the Quality and Outcomes Framework (QOF) has become embedded in the fabric of day-to-day general… (More)
Is this relevant?
2007
2007
Surface water quality can be determined by hydrological responses that vary geographically. The sub-surface hydrologic… (More)
  • figure 1
  • table 1:50
  • table 2
  • figure 2
  • figure 3
Is this relevant?
1992
1992
The clinical and biochemical outcome of a liver transplantation in a seven-year-old boy with acute porphyria due to… (More)
Is this relevant?