Suggested Topics within your search.
Suggested Topics within your search.
-
141
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
Get full text
Article -
142
Instrumentation System for Monitoring of Soil Variables in Precision Agriculture Applications
Published 2025-01-01“…Results showed that for the Kriging technique, MAE (mean absolute error) and RMSE (root-mean-square error) values were lower, confirming that this method is adequate for extrapolation and soil data visualization.…”
Get full text
Article -
143
A Secure IIoT Environment That Integrates AI-Driven Real-Time Short-Term Active and Reactive Load Forecasting with Anomaly Detection: A Real-World Application
Published 2024-11-01“…The model demonstrates very promising performance, with the average performance metrics for all appliances using this Isolation Forest model being 95% for Precision, 98% for Recall, 96% for F1 Score, and nearly 100% for Accuracy. To secure the entire system, Transport Layer Security (TLS) and Secure Sockets Layer (SSL) security protocols are employed, along with hash-encoded encrypted credentials for enhanced protection.…”
Get full text
Article -
144
Sécurité et Développement
Published 2010-06-01“…This article describes the transformations of the content of the policies presented by the words “security” and “development”, in Guatemala, since the fifties. …”
Get full text
Article -
145
A Call for a New Manifesto: Defending Humanity in an Age of Rising Extremism
Published 2025-07-01“…It calls for a renaissance of humanism rooted in respect, responsibility, and cooperation. …”
Get full text
Article -
146
-
147
Utilizing the Ethereum blockchain for retrieving and archiving augmented reality surgical navigation data
Published 2023-02-01Get full text
Article -
148
-
149
-
150
Safeguarding Nigeria: strategies for combating insurgency and terrorism
Published 2024-12-01“…The findings indicate that Nigeria’s security strategy is largely reactive, failing to address the fundamental root causes of violence, which are socio-economic disparities, political marginalisation, and historical grievances. …”
Get full text
Article -
151
Interdomain routing instability traceable detection method based on route state causal chain
Published 2021-12-01Get full text
Article -
152
Probabilistic linkages of propagation from meteorological to agricultural drought in the North African semi-arid region
Published 2025-04-01“…Statistical measures such as Spearman correlation (R), root mean square error (RMSE), and mean absolute error (MAE), are utilized to assess the performance of the meteorological drought index to detect the agricultural drought. …”
Get full text
Article -
153
Technologies of physical and chemical impact on potato planting material
Published 2024-06-01Get full text
Article -
154
Reimagining biosecurity: the ‘one life’ framework for pandemic response in the Caribbean
Published 2025-12-01“…The common perception of biosecurity has been one predominantly rooted in the medical and biological systematic thinking. …”
Get full text
Article -
155
“Disoriented Superpower”: U.S. Foreign Policy in the Post-Bipolar World
Published 2021-10-01“…Grounded in the concept developed by Christopher Hammer, the analysis presents the U.S. foreign policy as the product of a never-ending internal debate about the most optimal ways of promoting values, dealing with international institutions and prioritizing threats within a security perimeter. Taking stock of the choices made by consecutive presidents in each of the three areas the authors study the roots of foreign policy inertia of the sole superpower that resulted in unforced mistakes undermining its own political cohesion as well as hindering the emergence of lasting international architecture to replace the cold-war order. …”
Get full text
Article -
156
Innovative Transformation of S-Box Through Chaotic Map Using a Pragmatic Approach
Published 2024-01-01“…These S-Boxes often find their roots in the realm of chaotic maps, leveraging the inherent unpredictability and complexity of these mathematical constructs. …”
Get full text
Article -
157
-
158
The Effect of Photoplethysmography Signal Denoising on Compression Quality
Published 2025-03-01“…Compression quality is evaluated using various criteria, such as compression rate (CR) and Percentage Root Mean Square Difference (PRD). The results showed that regardless of the type of compression method, it is better not to remove noise before the compression process because doing so reduces CR and increases PRD.…”
Get full text
Article -
159
NIGERIA'S FOREIGN POLICY AND TRANSBORDER CRIME: AN OVERIEW
Published 2024-05-01“…These criminal operations threaten the nation's security, diplomatic relations, and global reputation. …”
Get full text
Article -
160
Capitalism, complexity, and polycrisis: toward neo-Gramscian polycrisis analysis
Published 2025-01-01Get full text
Article