Results 91 to 100 of about 8,269 (263)
Read the free Plain Language Summary for this article on the Journal blog. Abstract Plant phenology is crucial for understanding plant growth and climate feedback. It affects canopy structure, surface albedo, and carbon and water fluxes. While the influence of environmental factors on phenology is well‐documented, the role of plant intrinsic factors ...
Yunpeng Luo +8 more
wiley +1 more source
Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley +1 more source
Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study. [PDF]
Zarzycki K +7 more
europepmc +1 more source
Abstract Chemical and biological events present a challenging environment for forensic scientists to perform their work. This research is the follow‐up of the previous article that investigated the impact of decontaminants on fingermarks deposited on glass.
Isabelle Radgen‐Morvant +3 more
wiley +1 more source
Automatic Verification and Execution of Cyber Attack on IoT Devices. [PDF]
Færøy FL, Yamin MM, Shukla A, Katt B.
europepmc +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Beyond Manoeuvre Theory for European Defence
ABSTRACT This article contributes to the debate about European defence in the light of the Russo‐Ukraine war and growing doubts about US commitment to Europe. It argues that Europeans need to fundamentally relearn the ability to imagine military strategy from a European viewpoint.
Lukas Mengelkamp, Sam Vincent
wiley +1 more source
To date, the detection of cyberattacks is a very important task. Network monitoring is used for this purpose. Moreover, there is a need for rapid analytical processing of information, which requires the use of methods of data mining. Data mining helps to extract knowledge from acquired data.
openaire +1 more source
Western Balkans as the Frontline of Russian Hybrid Warfare
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley +1 more source
Cyber attack evaluation dataset for deep packet inspection and analysis. [PDF]
Shandilya SK +3 more
europepmc +1 more source

