Results 41 to 50 of about 2,486,163 (328)

Thunder CTF: Learning Cloud Security on a Dime [PDF]

open access: yesarXiv, 2021
Organizations have rapidly shifted infrastructure and applications over to public cloud computing services such as AWS (Amazon Web Services), Google Cloud Platform, and Azure. Unfortunately, such services have security models that are substantially different and more complex than traditional enterprise security models.
arxiv  

Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service

open access: yesIEEE Access, 2019
For a variety of cyber-attacks occurring in a power IoT-Cloud environment, conventional security intrusion incident detection and response technologies typically use pattern- and behavior-based statistical methods.
Chang Choi, Junho Choi
semanticscholar   +1 more source

Integration of Perovskite/Low‐Dimensional Material Heterostructures for Optoelectronics and Artificial Visual Systems

open access: yesAdvanced Functional Materials, EarlyView.
Heterojunctions combining halide perovskites with low‐dimensional materials enhance optoelectronic devices by enabling precise charge control and improving efficiency, stability, and speed. These synergies advance flexible electronics, wearable sensors, and neuromorphic computing, mimicking biological vision for real‐time image analysis and intelligent
Yu‐Jin Du   +11 more
wiley   +1 more source

Optoelectronic Devices for In‐Sensor Computing

open access: yesAdvanced Materials, EarlyView.
The raw data obtained directly from sensors in the noisy analogue domain is often unstructured, which lacks a predefined format or organization and does not conform to a specific data model. Optoelectronic devices for in‐sensor visual processing can integrate perception, memory, and processing functions in the same physical units, which can compress ...
Qinqi Ren   +7 more
wiley   +1 more source

Organizational cloud security and control: a proactive approach

open access: yesInformation Technology and People, 2019
Purpose The purpose of this paper is to unfold the perceptions around additional security in cloud environments by highlighting the importance of controlling mechanisms as an approach to the ethical use of the systems.
K. Spanaki   +3 more
semanticscholar   +1 more source

Robust Full‐Surface Bonding of Substrate and Electrode for Ultra‐Flexible Sensor Integration

open access: yesAdvanced Materials, EarlyView.
A direct hybrid bonding method that enables both gold and parylene bonding without adhesives is developed. This technique achieves full‐surface direct bonding of electrodes and substrates in flexible electronic connections. The method offers high flexibility, stable mechanical durability, and high‐resolution interconnections, accommodating varying ...
Masahito Takakuwa   +9 more
wiley   +1 more source

Photonic Nanomaterials for Wearable Health Solutions

open access: yesAdvanced Materials, EarlyView.
This review discusses the fundamentals and applications of photonic nanomaterials in wearable health technologies. It covers light‐matter interactions, synthesis, and functionalization strategies, device assembly, and sensing capabilities. Applications include skin patches and contact lenses for diagnostics and therapy. Future perspectives emphasize AI‐
Taewoong Park   +3 more
wiley   +1 more source

Security challenges and solutions using healthcare cloud computing

open access: yesJournal of Medicine and Life, 2021
Cloud computing is among the most beneficial solutions to digital problems. Security is one of the focal issues in cloud computing technology, and this study aims at investigating security issues of cloud computing and their probable solutions.
M. Mehrtak   +12 more
semanticscholar   +1 more source

Smart Dust for Chemical Mapping

open access: yesAdvanced Materials, EarlyView.
This review article explores the advancement of smart dust networks for high‐resolution spatial and temporal chemical mapping. Comprising miniature, wireless sensors, and communication devices, smart dust autonomously collects, processes, and transmits data via swarm‐based communication.
Indrajit Mondal, Hossam Haick
wiley   +1 more source

Analysis and Practice of Cloud Computing Information Security

open access: yesDianxin kexue, 2013
Cloud computing security issue is one of the most important and difficult problems encountered in today’s cloud computing technology to promote 1anding.From the cloud computing security in the information security section,the basic content of information
Detian Tong   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy