Showing 141 - 160 results of 747 for search 'security root', query time: 0.11s Refine Results
  1. 141

    TPCM-based trusted PXE boot method for servers by Guojie LIU, Jianbiao ZHANG

    Published 2020-12-01
    “…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
    Get full text
    Article
  2. 142

    Instrumentation System for Monitoring of Soil Variables in Precision Agriculture Applications by Diana Rueda-Delgado, Fredy Cuellar-Torres, Damian Martinez, Margarita Sofia Narducci

    Published 2025-01-01
    “…Results showed that for the Kriging technique, MAE (mean absolute error) and RMSE (root-mean-square error) values were lower, confirming that this method is adequate for extrapolation and soil data visualization.…”
    Get full text
    Article
  3. 143

    A Secure IIoT Environment That Integrates AI-Driven Real-Time Short-Term Active and Reactive Load Forecasting with Anomaly Detection: A Real-World Application by Md. Ibne Joha, Md Minhazur Rahman, Md Shahriar Nazim, Yeong Min Jang

    Published 2024-11-01
    “…The model demonstrates very promising performance, with the average performance metrics for all appliances using this Isolation Forest model being 95% for Precision, 98% for Recall, 96% for F1 Score, and nearly 100% for Accuracy. To secure the entire system, Transport Layer Security (TLS) and Secure Sockets Layer (SSL) security protocols are employed, along with hash-encoded encrypted credentials for enhanced protection.…”
    Get full text
    Article
  4. 144

    Sécurité et Développement by Agnès Bergeret

    Published 2010-06-01
    “…This article describes the transformations of the content of the policies presented by the words “security” and “development”, in Guatemala, since the fifties. …”
    Get full text
    Article
  5. 145

    A Call for a New Manifesto: Defending Humanity in an Age of Rising Extremism by Alberto Zucconi, Garry Jacobs

    Published 2025-07-01
    “…It calls for a renaissance of humanism rooted in respect, responsibility, and cooperation. …”
    Get full text
    Article
  6. 146
  7. 147
  8. 148
  9. 149
  10. 150

    Safeguarding Nigeria: strategies for combating insurgency and terrorism by O. O. Awotayo, N. O. Yusuf, S. O. Adedayo

    Published 2024-12-01
    “…The findings indicate that Nigeria’s security strategy is largely reactive, failing to address the fundamental root causes of violence, which are socio-economic disparities, political marginalisation, and historical grievances. …”
    Get full text
    Article
  11. 151
  12. 152

    Probabilistic linkages of propagation from meteorological to agricultural drought in the North African semi-arid region by Younes Dahhane, Victor Ongoma, Abdessamad Hadri, Mohamed Hakim Kharrou, Oualid Hakam, Abdelghani Chehbouni

    Published 2025-04-01
    “…Statistical measures such as Spearman correlation (R), root mean square error (RMSE), and mean absolute error (MAE), are utilized to assess the performance of the meteorological drought index to detect the agricultural drought. …”
    Get full text
    Article
  13. 153
  14. 154

    Reimagining biosecurity: the ‘one life’ framework for pandemic response in the Caribbean by Kirk O. Douglas

    Published 2025-12-01
    “…The common perception of biosecurity has been one predominantly rooted in the medical and biological systematic thinking. …”
    Get full text
    Article
  15. 155

    “Disoriented Superpower”: U.S. Foreign Policy in the Post-Bipolar World by O. I. Rebro, M. A. Suchkov

    Published 2021-10-01
    “…Grounded in the concept developed by Christopher Hammer, the analysis presents the U.S. foreign policy as the product of a never-ending internal debate about the most optimal ways of promoting values, dealing with international institutions and prioritizing threats within a security perimeter. Taking stock of the choices made by consecutive presidents in each of the three areas the authors study the roots of foreign policy inertia of the sole superpower that resulted in unforced mistakes undermining its own political cohesion as well as hindering the emergence of lasting international architecture to replace the cold-war order. …”
    Get full text
    Article
  16. 156

    Innovative Transformation of S-Box Through Chaotic Map Using a Pragmatic Approach by Awais Salman Qazi, Amjad Hussain Zahid, Abdullah Baz, Farrukh Arslan, Mubashir Ali, Jehad Ali

    Published 2024-01-01
    “…These S-Boxes often find their roots in the realm of chaotic maps, leveraging the inherent unpredictability and complexity of these mathematical constructs. …”
    Get full text
    Article
  17. 157
  18. 158

    The Effect of Photoplethysmography Signal Denoising on Compression Quality by Mohammadreza Alizadeh Aliabadi, Mohsen Karimi, Zahra Karimi, Mehrdad soheili Fard

    Published 2025-03-01
    “…Compression quality is evaluated using various criteria, such as compression rate (CR) and Percentage Root Mean Square Difference (PRD). The results showed that regardless of the type of compression method, it is better not to remove noise before the compression process because doing so reduces CR and increases PRD.…”
    Get full text
    Article
  19. 159

    NIGERIA'S FOREIGN POLICY AND TRANSBORDER CRIME: AN OVERIEW by OWUDA RASHIDA LAMIDI

    Published 2024-05-01
    “…These criminal operations threaten the nation's security, diplomatic relations, and global reputation. …”
    Get full text
    Article
  20. 160