Results 81 to 90 of about 829,033 (289)
Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets
Machine learning and artificial intelligence are increasingly being utilized to automate identifying and defining security requirements (SR) and addressing diverse IoT security issues.
Aftab Alam Janisar +4 more
doaj +1 more source
This study proposes a flexible MnO2‐P‐ICG nanofiber patch for laparoscopic treatment of liver tumors. The patch alleviates tumor hypoxia and induces photodynamic therapy (PDT) triggered immunogenic cell death, thereby activating the cGAS‐STING pathway and, in synergy with pachymaran, promoting NK cell–mediated innate immunity. This synergistic strategy
Jie Lin +14 more
wiley +1 more source
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source
What’s International Law Got to Do With It? Transnational Law and the Intelligence Mission [PDF]
The United States faces an immediate and continuous threat of terrorist attack using weapons of mass destruction, including nuclear weapons. The intelligence function and national security law, including international law--or more accurately ...
Baker, James E.
core +2 more sources
This study systematically reveals a complex interactive network involving plants, microbes, and insects, elucidating the ecological and molecular mechanisms by which cotton enhances its resistance to aphids through the active recruitment of the beneficial soil bacterium Delftia tsuruhatensis.
Hui Xue +11 more
wiley +1 more source
Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich +3 more
wiley +1 more source
Assessing Photovoltaic Recycling Capacities and Policy Gaps in the European Union
This study maps photovoltaic recycling capacity in the EU and key global regions, highlighting gaps between growing waste volumes and available infrastructure. It combines survey insights and policy analysis to identify recycling bottlenecks and offers recommendations to boost circularity in the solar sector.
Nieves Espinosa +3 more
wiley +1 more source
DATABASE SECURITY: THREATS AND PREVENTIVE MEASURES
Є велика кількість різноманітних загроз та вразливостей, які можуть виникнути під час розробки, управління та підтримки різних баз даних та систем управління базами даних. Метою статті є проведення поглибленого аналізу описаних загроз та визначення найбільш оптимальних заходів для їх усунення.
Pevnev, Volodimir, Kapchynskyi, Serhii
openaire +4 more sources
Economic Backwardness in Security Perspective [PDF]
Modern political economies are distinguished from each other by the institutions that mediate actors’ interactions, falling somewhere along a spectrum between pure market and non-market mechanisms. But how did these institutions originally emerge?
Carney, Richard
core +1 more source
ABSTRACT This study aims to explore the influence of Wine Tourism (WT) on the Sustainable Performance (SP) of wineries in Spain. It particularly investigates how Corporate Social Legitimacy (CSL) and Green Innovation (GI) may act as intermediary factors in this relationship.
Javier Martínez‐Falcó +3 more
wiley +1 more source

