Suggested Topics within your search.
Suggested Topics within your search.
-
41
-
42
Ontological Security of Poland’s Resistance to the European Relocation and Resettlement Scheme
Published 2024-12-01“…This article analyses Poland's foreign policy in resisting the European Union (EU) relocation and resettlement schemes from an ontological security perspective. The two aspects of ontological security theory utilized in this article, namely state biographical narratives and discursive strategies, and how these affect the changing pattern of Poland’s foreign policy behavior. …”
Get full text
Article -
43
-
44
A Cross-Chain Solution to Connect Multiple DNS Blockchains in Consensus Roots System
Published 2025-07-01“…The Domain Name System (DNS) is a key part of the Internet, and it is used for global domain name resolution. However, it has security risks due to its centralized or semi-centralized design and reliance on a few root servers. …”
Get full text
Article -
45
The New Social Roots of School Shootings: A Refined Constellation Theory of Rampage Attacks
Published 2025-07-01Get full text
Article -
46
Characterization of Rhizobia from Root Nodule and Rhizosphere of Lablab purpureus and Vigna sinensis in Bangladesh
Published 2017-01-01“…Nitrogen fixation resulting from mutual symbiosis of rhizobia and cultivated legume plants is therefore critical to food security as it directly affects agricultural production. …”
Get full text
Article -
47
Assessing the Biofumigation Efficacy of Cabbage Residue Against Root Knot Nematodes in Tomato Cultivation
Published 2025-01-01“…Organic amendments, resistant varieties, crop rotation, and cultural practices are other management practices that that can reduce the risk of root knot nematodes. Plant parasitic nematodes are regarded as one of the main issues restricting the yield of crops on a global scale, affecting food security due to the anticipated increase in population and dietary changes.…”
Get full text
Article -
48
Root and canopy traits and adaptability genes explain drought tolerance responses in winter wheat.
Published 2021-01-01“…Genotypes responded differently under drought stress and genotypes 39 (VORONA/HD24-12//GUN/7/VEE#8//…/8/ALTAY), 18 (BiII98) and 29 (NIKIFOR//KROSHKA) were the most drought tolerant. Root traits including shallow nodal root angle under irrigated conditions and root number per shoot under semiarid conditions were correlated with increased grain yield. …”
Get full text
Article -
49
Heat stress and soil thermal gradients shape root-associated fungal community recruitment
Published 2025-08-01“…This work presents the analysis of fungal microbiota from the rhizosphere and the root-associated fractions of tomato roots in response to high temperature. …”
Get full text
Article -
50
Identification of water deficit stress tolerant genotypes of common bean using adaptive root and shoot traits under different screening systems
Published 2025-06-01“…There was significant genetic variability in per se response and plasticity of root and shoot traits, under control and water deficit stress, Basal root angle ranged from 36.67 to 56.67 while as basal root number had a range of 7.45–14.33. …”
Get full text
Article -
51
Modeling Economy of Information Security of Business Entity Based on Simplex-Method
Published 2021-02-01“…In the field of information security it is always necessary to support a required level of protection, which can cause serious financial costs. …”
Get full text
Article -
52
UCAP:a PCL secure user authentication protocol in cloud computing
Published 2018-08-01“…As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed.The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase.In the initial authentication phase,the trusted third party generated a root communication session key.In the re-authentication phase,communication users negotiated a sub session key without the trusted third party.To verify the security properties of the protocol,a sequential compositional proof method was used under the protocol composition logic model.Compared with certain related works,the proposed protocol satisfies the PCL security.The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes,while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party.Through the analysis results,the proposed protocol is suitable for the mutual authentication in cloud computing.…”
Get full text
Article -
53
BSAGIoT: A Bayesian Security Aspect Graph for Internet of Things (IoT)
Published 2025-04-01“…In addition, root cause identification of security challenges, how they affect one another, their impact on IoT networks via topological sorting, and risk assessment could be achieved. …”
Get full text
Article -
54
Design and Implementation of a Physically Secure Open-Source FPGA and Toolchain
Published 2025-06-01“… The increasing prevalence of security breaches highlights the importanceof robust hardware security measures. …”
Get full text
Article -
55
Security monitoring via sound analysis and voice identification with artificial intelligence
Published 2024-08-01“…Successful correct recognition of the test voice profiles on access and security personalization with a quantitative equivalent of 100.0 % accuracy was achieved in the Linear transfer function for Cascade-Forward Neural Networks. …”
Get full text
Article -
56
LEGAL SECURITY AND THE PRINCIPLE OF LEGAL CERTAINTY : A HISTORICAL AND ANALYTICAL PERSPECTIVE
Published 2025-03-01“…Abstract: This article explores the interplay between legal security and legal certainty, emphasisig their critical role in maintaining the rule of law. …”
Get full text
Article -
57
Looking for the optimum security architecture in Europe: EU and NATO – together or apart?
Published 2021-10-01“…This notwithstanding, while the U.S. foreign policy priorities have been changing, the members of the transatlantic community have seemed to be drifting further apart, which causes the development of alternative projects to maintain European security. This article aims to compare the current state of aff airs in the transatlantic and the European security systems, relying on the parameters, developed within the framework of the security communities theory, so as to access their feasibility and prospects. …”
Get full text
Article -
58
Between integration, security and humanitarianism: Serbian citizens’ attitudes towards migrants
Published 2017-01-01“…Under the security perspective, it is understood that migrants pose a potential risk for the security of domestic population. …”
Get full text
Article -
59
-
60