Results 71 to 80 of about 393,145 (302)
RPKI Defense Capability Simulation Method Based on Container Virtualization
As the main inter-domain routing protocol in today’s internet, the Border Gateway Protocol (BGP) faces serious security risks during actual usage. Research on BGP malicious attack methods requires a realistic network environment, and evaluation methods ...
Bo Yu, Xingyuan Liu, Xiaofeng Wang
doaj +1 more source
SDIO robotics in space applications [PDF]
Robotics in space supporting the Strategic Defense System (SDS) program is discussed. Ongoing initiatives which are intended to establish an initial Robotics in Space capability are addressed.
Iliff, Richard
core +1 more source
The impact of Singapore’s military development on Malaysia’s security [PDF]
In this intense era of military and defense development in South East Asia, Singapore has emergence as the fastest country in the development of military capabilities.The rapid military development that started in 1965 has made Singapore become the ...
Ajis, Mohd Na'eim +2 more
core +1 more source
Objective Frailty occurs prematurely in rheumatoid arthritis (RA) and is associated with poor health outcomes. We compared the performance of four frailty instruments, including a pragmatic alternative measure using chair sit‐to‐stand (STS), and evaluated their abilities to predict poor health outcomes.
Kylie E. Riggles +14 more
wiley +1 more source
THE IDENTIFICATION OF ENEMY INTENTIONS THROUGH OBSERVATION OF LONG LEAD-TIME MILITARY PREPARATIONS [PDF]
Intuitively, we would expect that an increase in the military preparations of potential enemies imply that the rival perceives an increase in the likelihood of future conflict.
Lipow, Jonathan, Plessner, Yakir
core +1 more source
The American Aircraft Industrial Base: On the Brink [PDF]
An article reviewing the decline in the American aircraft industrial ...
King, David R.
core +1 more source
“Super-sizing” the DPRK threat : Japan’s evolving military posture and North Korea [PDF]
Japan's reemergence as a "normal" military power has been accelerated by the "super-sizing" of North Korea: a product of the North's extant military threat, multiplied exponentially by its undermining of U.S.-Japan alliance solidarity, views of the North
Hughes, Christopher W.
core +1 more source
Thermoreflectance Detection of Point Defects Resulting from Focused Ion Beam Milling
Focused ion beam (FIB) milling is a common tool for nanoscale material processing, however irradiation damage, redeposition, and contamination can occur. We use several characterization tools to show FIB‐induced effects beyond 1 mm from the milled area.
Thomas W. Pfeifer +3 more
wiley +1 more source
Optimum response scheme of intrusion detection based on information theory
Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on ...
Youliang TIAN, Yulong WU, Qiuxian LI
doaj +2 more sources
Securing guarantees : how nuclear proliferation can strengthen great power commitments [PDF]
The number of states with nuclear weapons has grown at a much slower rate than many predicted during the early years of the Cold War. Yet the reasons for this slow rate of proliferation are not well understood.
Phillips, Julianne Nicole
core +1 more source

