Results 31 to 40 of about 45,472 (162)

Smart Structures. La arquitectura inteligente de José Miguel de Prada Poole [PDF]

open access: yes, 2014
En 1968, el arquitecto español José Miguel de Prada Poole (Valladolid 1938) inicia sus investigaciones sobre Estructuras Pneumáticas de Respuesta Variable, influido por la cibernética y las incipientes técnologías de computación.
Cobo Arévalo, Antonio
core   +1 more source

Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems

open access: yesJournal of Critical Infrastructure Policy, Volume 5, Issue 2, Page 88-110, Fall/Winter 2024.
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer   +5 more
wiley   +1 more source

Predicting Thalasso Tourist Delight: A Hybrid SEM—Artificial Intelligence Analysis

open access: yesComplexity, Volume 2018, Issue 1, 2018., 2018
This study focuses on the influence of the quality of services received by thalassotherapy customers on their global satisfaction and the relationship between this and the word of mouth. This study uses a hybrid SEM—classification tree analysis. The empirical findings reveal a significant relationship between the quality of each offered service and ...
Agustín J. Sánchez-Medina   +4 more
wiley   +1 more source

Cyber risk management approach from the high business management [PDF]

open access: yes, 2017
El mundo actual se encuentra creciendo bajo un marco de globalización aspectos como el internet, las redes sociales, y la evolución tecnológica hacen que la teoría del profesor y filósofo canadiense Marshall Mc Luhan cobre mayor importancia sobre su
Riveros Cardenas, Fredy Orlando
core  

Técnica, posthumanismo, experiencia [PDF]

open access: yes, 2016
El presente trabajo propone una reflexión sobre la técnica y sobre las condiciones de una crítica de la técnica en el horizonte contemporáneo del agotamiento de los paradigmas humanistas desde los que tradicionalmente se pensó esa crítica. Se plantea que
Garcia Garcia, Luis Ignacio
core   +2 more sources

Core concerns: The need for a governance framework to protect global Internet infrastructure

open access: yesPolicy &Internet, Volume 16, Issue 2, Page 411-427, June 2024.
Abstract The war in Ukraine has underscored the risks and threats to global Internet infrastructure from geopolitically motivated cyber operations. The Domain Name System and core protocols responsible for the routing, forwarding, and security of Internet traffic have been exploited by actors in Russia and Ukraine for denial‐of‐service attacks ...
Dennis Broeders, Arun Sukumar
wiley   +1 more source

Activity of Antimicrobial Silver Polystyrene Nanocomposites

open access: yesJournal of Nanomaterials, Volume 2012, Issue 1, 2012., 2012
A simple technique based on doping polymers with in situ generated silver nanoparticles (Ag/PS films) has been developed. In particular, an antiseptic material has been prepared by dissolving silver 1,5‐cyclooctadiene‐hexafluoroacetylacetonate in amorphous polystyrene, and the obtained solid solution has been heated for ca.
M. Palomba   +6 more
wiley   +1 more source

Design, Prototyping and Stratospheric Launch of CubeSats for University Competition

open access: yesJournal of Aerospace Technology and Management, 2023
This work presents the design and prototyping of two 1U standard CubeSats for the First Brazilian MCTI Satellite Olympiad, launching one in a stratospheric helium-filled balloon.
Diego Anestor Coutinho   +6 more
doaj  

De la seguridad cibernética a la resiliencia cibernética aplicada a la protección de datos personales (Tema Central) [PDF]

open access: yes, 2017
Information and communication technologies allows us to live in a network society, however there are several risks of a hyperconectivity, one of them is the safety of the information; some of these information is personal data. This challenge was assumed
Orellana Robalino, Claudia
core   +1 more source

Gentlemen, you can't fight in here. Or can you?: How cyberspace operations impact international security 先生们,你们不能在这里打架。你们能吗?:网络空间操作如何影响国际安全 Caballeros, no pueden pelear aquí. ¿O puedes?: Cómo las operaciones del ciberespacio impactan la seguridad internacional

open access: yesWorld Affairs, Volume 187, Issue 1, Page 24-36, Spring 2024.
Abstract The military now views cyberspace as a new warfare domain, with constant cyber operations potentially causing significant consequences. Internationally, countries are heavily involved in cyberspace, but international law lags behind this evolution, raising questions about its application and retaliation measures.
Sam Maesschalck
wiley   +1 more source

Home - About - Disclaimer - Privacy