Results 11 to 20 of about 3,451 (201)
Emphasise details of 3D-printed bones with contrast paints. [PDF]
Medical Education, Volume 57, Issue 2, Page 191-191, February 2023.
Poór VS, Tóth D, Simon G.
europepmc +2 more sources
Towards a security‐driven automotive development lifecycle
Cybersecurity has become one of the most crucial challenges in the automotive development lifecycle. The upcoming ISO/SAE 21434 standard provides only a generic framework that is insufficient to derive concrete design methods. At this stage, the ISO/SAE 21434 is very difficult to understand and apply without concrete practice guidelines.
Jürgen Dobaj +4 more
wiley +1 more source
An empirical analysis of sentencing of “Access to Information” computer crimes
Abstract There is a widespread perception that computer crime sentencing is too harsh. But this criticism has occurred in the absence of comprehensive, multi‐year data on how computer crimes are actually sentenced and how those sentences compare to other, purportedly similar crimes, such as trespass, burglary, or fraud. This article uses an analysis of
James T. Graves, Alessandro Acquisti
wiley +1 more source
xDEVS: A toolkit for interoperable modeling and simulation of formal discrete event systems
Abstract Employing Modeling and Simulation (M&S) extensively to analyze and develop complex systems is the norm today. The use of robust M&S formalisms and rigorous methodologies is essential to deal with complexity. Among them, the Discrete Event System Specification (DEVS) provides a solid framework for modeling structural, behavior and information ...
José L. Risco‐Martín +4 more
wiley +1 more source
Analysis of performance on a modified Wisconsin Card Sorting Test for the military [PDF]
Purpose – Current Army doctrine stresses a need for military leaders to have the capability to make flexible and adaptive decisions based on a future unknown environment, location and enemy.
Cardy Moten III +3 more
doaj +1 more source
We present a series of four wargames intended to improve our ability to analyze the alliance aspect of Norwegian military operations. We discuss the objectives, the set-up, and the lessons learned.
Dagfinn Vatne +3 more
doaj +1 more source
Optimized Talent Development Model in the Islamic Republic of Iran's Army: A Combination of Network Content Analysis and Fuzzy Sets Theory [PDF]
Background and Objective: Researchers aim to address in proposing a model for optimal talent development in the Army of the Islamic Republic of Iran.Method: This research is of a developmental-applied nature and was conducted using an exploratory mixed ...
Behnam Golshahi +2 more
doaj +1 more source
Artificial intelligence (AI) has become a reality in today’s world with the rise of the 4th industrial revolution, especially in the armed forces. Military AI systems can process more data more effectively than traditional systems. Due to its intrinsic computing and decision‐making capabilities, AI also increases combat systems’ self‐control, self ...
Adib Bin Rashid +4 more
wiley +1 more source
[Retracted] Assessment and Test‐case Study of Wi‐Fi Security through the Wardriving Technique
This study aims to investigate Wireless Local Area Network (WLAN) within the context of its applicability as a 21st‐century business tool and its survivability in a security threat‐infested cyber landscape. WLAN security leverages the Wardriving technique deployed within geolocation to scan for WLAN density and explore the associated security ...
Victor Ojong Etta +5 more
wiley +1 more source
CONVERTING THEORY AND WAR DOCTRINE TO REALISTIC TRAINING FOR ENSURING THE SUCCESS OF MILITARY CAMPAIGN PLANNING [PDF]
Military campaigns in the 21st Century are extremely complex multi-dimensional undertakings. In today’s globalized reality, influence of wars will go beyond the theatre of operations into issues of international economy, human migration, airspace and sea
Alok Ahlawat +5 more
doaj +1 more source

