Results 51 to 60 of about 365,185 (272)
Web development evolution: the assimilation of web engineering security [PDF]
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core +1 more source
A novel descriptor and a bottom‐up design principle are established to enable the rational design of hydrogen storage materials based on d‐block transition metal single‐atom COFs. By modulating H₂ adsorption through d‐orbital tuning, this approach achieves both high storage capacity and fast kinetics, while revealing a volcano‐type relationship between
Qiuyan Yue+24 more
wiley +1 more source
Advancements in electronics and sensor technologies are driving the deployment of ubiquitous sensor networks across various applications, including asset monitoring, security, and networking.
Javier Vázquez-Castillo+7 more
doaj +1 more source
Locking Metastable Topological Domains in Nematic Liquid Crystal Pi Cells
Selective photopolymerization in the presence of a controlled voltage defines permanent director walls that lock‐in metastable bend and twist configurations within nematic liquid crystal Pi cells. Q‐tensor simulations corroborate the experiments, demonstrating the topological state stabilization.
Adithya Pradeep+7 more
wiley +1 more source
Cybersecurity economics - balancing operational security spending
Purpose The purpose of this paper is to demonstrate how to find the optimal investment level in protecting an organisation’s assets. Design/methodology/approach This study integrates a case study of an international financial organisation with various
Stale Ekelund, Z. Iskoujina
semanticscholar +1 more source
Design and Applications of Multi‐Frequency Programmable Metamaterials for Adaptive Stealth
This article provides a comprehensive overview of metamaterials, including their fundamental principles, properties, synthesis techniques, and applications in stealth, as well as their challenges and future prospects. It covers topics that are more advanced than those typically discussed in existing review articles, while still being closely connected ...
Jonathan Tersur Orasugh+4 more
wiley +1 more source
The new generation nanobomb, termed the stealth nanobomb, is fabricated through self‐assembly using a polymeric carbon monoxide carrier (PLGA(CO)), small molecule near‐infrared‐active agents (2TT‐OC46B), and phospholipid polyethylene glycol (DSPE‐mPEG2000). The stealth nanobomb can circulate in the bloodstream and specifically target pancreatic cancer,
Gongcheng Ma+10 more
wiley +1 more source
A proposed case for the cloud software engineering in security [PDF]
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core
Mining known attack patterns from security-related events
Managed Security Services (MSS) have become an essential asset for companies to have in order to protect their infrastructure from hacking attempts such as unauthorized behaviour, denial of service (DoS), malware propagation, and anomalies.
Nicandro Scarabeo+2 more
semanticscholar +1 more source
Nanobody‐Decorated Lipid Nanoparticles for Enhanced mRNA Delivery to Tumors In Vivo
This study presents a targeted mRNA‐LNP platform engineered with anti‐PSMA nanobodies for prostate cancer therapy. Using different in vivo models, the authors demonstrate selective uptake and mRNA delivery in PSMA+ cancer cells. However, while targeting is enhanced, mRNA delivery efficacy is limited by tissue penetration, tumor necrosis, and immune ...
Pol Escudé Martinez de Castilla+16 more
wiley +1 more source