Results 51 to 60 of about 239,789 (239)
Advancements in electronics and sensor technologies are driving the deployment of ubiquitous sensor networks across various applications, including asset monitoring, security, and networking.
Javier Vázquez-Castillo +7 more
doaj +1 more source
Arguing satisfaction of security requirements [PDF]
This chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the
Haley, Charles B. +3 more
core
Decellularized liver extracellular matrix scaffolds provide a platform to study dormant liver‐metastatic colorectal cancer. They induce reversible dormancy, in combination with nutrient depletion and low dose chemotherapy, through cell cycle arrest and chemotherapy resistance.
Sabrina N. VandenHeuvel +13 more
wiley +1 more source
This study introduces an innovative approach to treating intervertebral disc degeneration using ultrasound‐triggered in situ hydrogel formation. Proof‐of‐concept experiments using optimized biomaterial and ultrasound parameters demonstrate partial restoration of biomechanical function and successful integration into degenerated disc tissue, offering a ...
Veerle A. Brans +11 more
wiley +1 more source
A human cell‐based microphysiological system integrates engineered muscle tissues with an inflamed adipose–macrophage niche to model obese microenvironment‐induced muscle dysfunction. Muscle contraction is quantified by pillar deflection coupled with computational stiffness estimation. Secretome and transcriptomic profiling reveal inflammation‐mediated
Seunggyu Kim +16 more
wiley +1 more source
Introduction to Security Onion [PDF]
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis.
Heenan, Ross, Moradpoor, Naghmeh
core
Growth Hormone‐Loaded 3D Printed Silk Fibroin‐Cellulose Dressings for Ischemic Wounds
3D‐printed wound dressings combining carboxymethyl cellulose, silk fibroin, and growth hormone accelerate healing in diabetic ulcers. These bioactive, customizable dressings enhance angiogenesis, cellular proliferation, and immune modulation. Proteomic analysis reveals activation of regenerative pathways and reduced fibrosis, highlighting their ...
Maria Pita‐Vilar +7 more
wiley +1 more source
Asymptotic Methods for Asset Market Equilibrium Analysis [PDF]
General equilibrium analysis is difficult when asset markets are incomplete. We make the simplifying assumption that uncertainty is small and use bifurcation methods to compute Taylor series approximations for asset demand and asset market equilibrium. A
Kenneth L. Judd, Sy-Ming Guu
core
A dual‐crosslinking poly(ethylene glycol) (PEG) hydrogel is presented that rapidly solidifies and progressively adheres to tissue, achieving durable sealing of bile leaks. In hepatectomy models, this system prevents postoperative complications more effectively than conventional sealants, highlighting its translational potential as a safe and efficient ...
Kazuyoshi Matsubara +7 more
wiley +1 more source
Towards Security Requirements in Online Summative Assessments
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core

