Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation

Search Page

Filters

My NCBI Filters

Results by year

Table representation of search results timeline featuring number of search results per year.

Year Number of Results
1989 1
2011 1
2012 3
2016 2
2017 1
2018 1
2019 2
2020 2
2021 3
2022 1
2024 0

Text availability

Article attribute

Article type

Publication date

Search Results

12 results

Results by year

Filters applied: . Clear all
Page 1
A Review of Eptinezumab Use in Migraine.
Datta A, Maryala S, John R. Datta A, et al. Among authors: john r. Cureus. 2021 Sep 16;13(9):e18032. doi: 10.7759/cureus.18032. eCollection 2021 Sep. Cureus. 2021. PMID: 34540516 Free PMC article. Review.
It was found to be effective at reducing time to headache pain freedom during acute migraine attacks as well. Eptinezumab is a relatively safe drug for the prevention of migraines with treatment-related adverse events occurring at a low frequency. ...
It was found to be effective at reducing time to headache pain freedom during acute migraine attacks as well. Eptinezumab is a relati …
The Psychophysics of Terror Attack Casualty Counts.
Baucum M, John R. Baucum M, et al. Among authors: john r. Risk Anal. 2020 Feb;40(2):399-407. doi: 10.1111/risa.13396. Epub 2019 Sep 4. Risk Anal. 2020. PMID: 31483513
In communicating the risk that terror attacks pose to the public, government agencies and other organizations must understand which characteristics of an attack contribute to the public's perception of its severity. An attack's casualty count is one of the mo …
In communicating the risk that terror attacks pose to the public, government agencies and other organizations must understand which c …
Lies, Damned Lies, and Social Media Following Extreme Events.
Byrd K, John RS. Byrd K, et al. Among authors: john rs. Risk Anal. 2022 Aug;42(8):1704-1727. doi: 10.1111/risa.13719. Epub 2021 Mar 17. Risk Anal. 2022. PMID: 33733476
A U.S. adult sample (N = 588) was presented 20 actual social media posts following a natural disaster or soft-target terrorist attack in the United States. In this study, social media posts are conceptualized as truth signals with varying strengths, either above or below e …
A U.S. adult sample (N = 588) was presented 20 actual social media posts following a natural disaster or soft-target terrorist attack
Halide perovskite memristors as flexible and reconfigurable physical unclonable functions.
John RA, Shah N, Vishwanath SK, Ng SE, Febriansyah B, Jagadeeswararao M, Chang CH, Basu A, Mathews N. John RA, et al. Nat Commun. 2021 Jun 17;12(1):3681. doi: 10.1038/s41467-021-24057-0. Nat Commun. 2021. PMID: 34140514 Free PMC article.
Cycle-to-cycle write variability enables reconfigurability, while in-memory computing empowers a strong recurrent PUF construction to thwart machine learning attacks....
Cycle-to-cycle write variability enables reconfigurability, while in-memory computing empowers a strong recurrent PUF construction to thwart …
Behavioral Determinants of Target Shifting and Deterrence in an Analog Cyber-Attack Game.
Kusumastuti SA, Blythe J, Rosoff H, John RS. Kusumastuti SA, et al. Among authors: john rs. Risk Anal. 2020 Mar;40(3):476-493. doi: 10.1111/risa.13402. Epub 2019 Sep 17. Risk Anal. 2020. PMID: 31529801
Players are incentivized by a payoff system that offers a reward for successfully attacked targets and a penalty for failed attacks. We collected data from a total of 1,600 separate target selections from 80 players and discovered that the target type with the lowes …
Players are incentivized by a payoff system that offers a reward for successfully attacked targets and a penalty for failed attack
Flu, risks, and videotape: escalating fear and avoidance.
Rosoff H, John RS, Prager F. Rosoff H, et al. Among authors: john rs. Risk Anal. 2012 Apr;32(4):729-43. doi: 10.1111/j.1539-6924.2012.01769.x. Epub 2012 Feb 14. Risk Anal. 2012. PMID: 22332702
Systemic manipulation of the virus's causal origin (terrorist attack, medical lab accident, unknown) and the respondent's proximity to the virus (local vs. opposite coast) allowed us to investigate the dynamics of public response. ...
Systemic manipulation of the virus's causal origin (terrorist attack, medical lab accident, unknown) and the respondent's proximity t …
Public Response to a Near-Miss Nuclear Accident Scenario Varying in Causal Attributions and Outcome Uncertainty.
Cui J, Rosoff H, John RS. Cui J, et al. Among authors: john rs. Risk Anal. 2018 May;38(5):947-961. doi: 10.1111/risa.12920. Epub 2017 Nov 24. Risk Anal. 2018. PMID: 29171903
Simulating a loss-of-coolant accident (LOCA) scenario, we manipulated (1) attribution for the initial cause of the incident (software failure vs. cyber terrorist attack vs. earthquake), (2) attribution for halting the incident (fail-safe system design vs. an intervention b …
Simulating a loss-of-coolant accident (LOCA) scenario, we manipulated (1) attribution for the initial cause of the incident (software failur …
Differentiating conflicts in beliefs versus value tradeoffs in the domestic intelligence policy debate.
Dillon RL, Lester G, John RS, Tinsley CH. Dillon RL, et al. Among authors: john rs. Risk Anal. 2012 Apr;32(4):713-28. doi: 10.1111/j.1539-6924.2011.01747.x. Epub 2011 Dec 28. Risk Anal. 2012. PMID: 22212111
Since the 9/11 terrorist attacks, there has been an increase in public discussion regarding U.S. domestic intelligence activities. ...
Since the 9/11 terrorist attacks, there has been an increase in public discussion regarding U.S. domestic intelligence activities. .. …
Cumulative Response to Sequences of Terror Attacks Varying in Frequency and Trajectory.
Cui J, Rosoff H, John RS. Cui J, et al. Among authors: john rs. Risk Anal. 2016 Dec;36(12):2272-2284. doi: 10.1111/risa.12577. Epub 2016 Feb 10. Risk Anal. 2016. PMID: 26865205
For each of the nine conditions, three videos were created to simulate news broadcasts documenting the attacks over a three-week period. A total of 275 respondents were included in the analysis. Results from analysis of covariances (ANCOVAs) indicate that trajectory of the …
For each of the nine conditions, three videos were created to simulate news broadcasts documenting the attacks over a three-week peri …
Attacker Deterrence and Perceived Risk in a Stackelberg Security Game.
Ridinger G, John RS, McBride M, Scurich N. Ridinger G, et al. Among authors: john rs. Risk Anal. 2016 Aug;36(8):1666-81. doi: 10.1111/risa.12547. Epub 2016 Feb 17. Risk Anal. 2016. PMID: 26889768
In Stackelberg security games, a defender must allocate scarce resources to defend against a potential attacker. The optimal defense involves the randomization of scarce security resources, yet how attackers perceive the risk given randomized defense is not well und …
In Stackelberg security games, a defender must allocate scarce resources to defend against a potential attacker. The optimal defense …
12 results