Results 51 to 60 of about 221,142 (145)
A novel descriptor and a bottom‐up design principle are established to enable the rational design of hydrogen storage materials based on d‐block transition metal single‐atom COFs. By modulating H₂ adsorption through d‐orbital tuning, this approach achieves both high storage capacity and fast kinetics, while revealing a volcano‐type relationship between
Qiuyan Yue+24 more
wiley +1 more source
Defense against Insider Threat: a Framework for Gathering Goal-based Requirements [PDF]
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges.
Franqueira, Virginia Nunes Leal+1 more
core +3 more sources
Asymptotic Methods for Asset Market Equilibrium Analysis [PDF]
General equilibrium analysis is difficult when asset markets are incomplete. We make the simplifying assumption that uncertainty is small and use bifurcation methods to compute Taylor series approximations for asset demand and asset market equilibrium. A
Kenneth L. Judd, Sy-Ming Guu
core
Auditoría de gestión de seguridad informática, en entidades públicas y privadas en Loja
RESUMEN Este documento exhibe información sobre normas, estándares y metodologías, utilizados para la gestión de seguridad de un Data Center y Red LAN.
Carlos Jaramillo+5 more
doaj
Towards Security Requirements in Online Summative Assessments
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core
Toward optimal multi-objective models of network security: Survey [PDF]
Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed
Huang, W, Maple, C, Viduto, Valentina
core
Desarrollo de software esteganográfico con criptográfia asociada
RESUMEN Proteger la información es un requisito fundamental para preservar su confidencialidad e integridad. El uso de criptografía y esteganografía, más que un simple compendio de técnicas y algoritmos, se ha convertido en una necesidad urgente en ...
Jorge Rivadeneira, Basel Halak
doaj
The Game of Credit: A High Stakes Game That Perpetuates the Racial Wealth Gap [PDF]
Everyone deserves the opportunity to build a financially secure future for themselves and their families. Access to equal opportunities is the cornerstone of America's core values and is also a necessity to growing a healthy economy.
Lindy Carrow
core
Firearm-related action recognition and object detection dataset for video surveillance systems
The proposed dataset is comprised of 398 videos, each featuring an individual engaged in specific video surveillance actions. The ground truth for this dataset was expertly curated and is presented in JSON format (standard COCO), offering vital ...
Jesus Ruiz-Santaquiteria+4 more
doaj
U.S. public and private venture capital markets, 1998-2001: A fundamental information analysis [PDF]
Systematic analysis of U.S. capital markets reveals important empirical facts that analytical modeling or empirical research seeking to explain the 1998-2001 movements needs to recognize. There is no single "bubble point" at which U.S.
Armstrong, Chris+3 more
core