Results 41 to 50 of about 10,120,233 (322)
JOINT OPERATIONS – THE CONTINUITY OF A FUNCTIONAL INSTRUMENT
With the emergence of the notion of multi-domain, all the elements that until now have been associated with the notion of joint, be it battle, operation or formation (in the sense of structure) have become associated with this new fashionable notion ...
Alexandru CUCINSCHI, Ion CHIORCEA
doaj
Enabling security checking of automotive ECUs with formal CSP models [PDF]
This paper presents an approach, using the process-algebra CSP, that aims to support systematic security testing of ECU components. An example use case regarding Over-The-Air software updates demonstrates the potential of our approach.
Bryans, Jeremy +4 more
core +1 more source
The Theoretical Approaches to Defining the Essence of the Concept of «National Security» and Its Components [PDF]
In recent decades, the concept of security has occupied a special place concerning life processes and various spheres of the economy of the countries of the world.
Khaustova Viktoriia Ye. +1 more
doaj +1 more source
Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus +6 more
wiley +1 more source
Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks [PDF]
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN ...
Loo, KK, Naeem, T
core +1 more source
Plastic products in plant production and protection help farmers increase crop production, enhance food quality, and reduce global water use and their environmental footprint.
Imran Ali Lakhiar +10 more
semanticscholar +1 more source
Security and Privacy Issues in IoT Environment
Internet of Things (IoT) is becoming an emerging trend superseding other technologies and researchers considered it as the future of internet. As now the connectivity to the World Wide Web is becoming highly available cost is drastically decreasing so ...
N. Thilakarathne
semanticscholar +1 more source
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman +2 more
wiley +1 more source
Heavy Metal Pollution Near a Tannery in Ulaanbaatar, Mongolia
Background. Due to an increase in population density and industrialization, the capital city of Mongolia, Ulaanbaatar, has been experiencing an increase in environmental pollution; especially soil contamination.
Erdenesaikhan Naidansuren +3 more
doaj +1 more source
Examination of security environment in many security papers and studies is focused primarily on analysis of external security environment of different countries.
Ladislav Hofreiter +4 more
doaj +1 more source

