Search Results - "Chouman, Mohamad"
-
1
Effects of a Single Dose of Ivermectin on Viral and Clinical Outcomes in Asymptomatic SARS-CoV-2 Infected Subjects: A Pilot Clinical Trial in Lebanon
Published in Viruses (26-05-2021)“…This study was designed to determine the efficacy of ivermectin, an FDA-approved drug, in producing clinical benefits and decreasing the viral load of…”
Get full text
Journal Article -
2
Retraction: Samaha et al. Effects of a Single Dose of Ivermectin on Viral and Clinical Outcomes in Asymptomatic SARS-CoV-2 Infected Subjects: A Pilot Clinical Trial in Lebanon. Viruses 2021, 13 , 989
Published in Viruses (26-10-2021)“…The journal retracts the article, Effects of a Single Dose of Ivermectin on Viral and Clinical Outcomes in Asymptomatic SARS-CoV-2 Infected Subjects: A Pilot…”
Get full text
Journal Article -
3
RETRACTED: Samaha et al. Effects of a Single Dose of Ivermectin on Viral and Clinical Outcomes in Asymptomatic SARS-CoV-2 Infected Subjects: A Pilot Clinical Trial in Lebanon. Viruses 2021, 13, 989
Published in Viruses (26-10-2021)“…The journal retracts the article, Effects of a Single Dose of Ivermectin on Viral and Clinical Outcomes in Asymptomatic SARS-CoV-2 Infected Subjects: A Pilot…”
Get full text
Journal Article -
4
RETRACTED: Effects of a Single Dose of Ivermectin on Viral and Clinical Outcomes in Asymptomatic SARS-CoV-2 Infected Subjects: A Pilot Clinical Trial in Lebanon
Published in Viruses (26-05-2021)“…Objective: This study was designed to determine the efficacy of ivermectin, an FDA-approved drug, in producing clinical benefits and decreasing the viral load…”
Get full text
Journal Article -
5
A collaborative defense mechanism against SYN flooding attacks in IP networks
Published in Journal of network and computer applications (01-11-2008)“…SYN flooding exploits the Transmission Control Protocol (TCP) three-way handshake process by sending many connection requests using spoofed source IP addresses…”
Get full text
Journal Article -
6
Novel defense mechanism against SYN flooding attacks in IP networks
Published in Canadian Conference on Electrical and Computer Engineering, 2005 (2005)“…SYN flooding exploits the TCP three-way handshake process by sending many connection requests with spoofed source IP addresses to the victim. This keeps the…”
Get full text
Conference Proceeding