Results 141 to 150 of about 4,301,094 (348)
Federal Information Processing Standards Publication: glossary for computer systems security
openalex +1 more source
Triple Passivation Treatment (TPT) strategy enables 1.75 eV wide‐bandgap perovskite solar cells (WB‐PSCs) with suppressed halide phase segregation and n‐to‐p type surface transition. The photoluminescence quantum yield increases from 0.5 to 2.1%, indicating reduced non‐radiative losses.
Siming Huang+12 more
wiley +1 more source
Laboratory projects for promoting hands-on learning in a computer security course [PDF]
Janice E. Huss
openalex +1 more source
Fully Bio‐Based Epoxy Resins from Liquefied Wood for Chemically Recyclable Wood Coatings
A bio‐based and chemically recyclable epoxy resin derived from liquefied wood and its use in wood coatings is presented. The resin exhibits mechanical, thermal, and water‐resistant properties comparable to commercial coatings and can be chemically recycled and reused. This approach provides fast access to glossy and fully biobased durable wood coatings
Qisong Hu+6 more
wiley +1 more source
Computer security for data collection technologies. [PDF]
Cobb C+5 more
europepmc +1 more source
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida+16 more
wiley +1 more source
A single‐step, low‐temperature co‐pyrolysis process removes encapsulated seed metal NPs (10–50 nm) from CNTs, redistributing them as surface‐anchored metal and metal–nitride NCs (1–1.5 nm). Herein, Ni3N NCs achieve an ultra‐low onset overpotential for CO2 reduction to CO with >98% Faradaic efficiency across 100–700 mA cm−2.
Ahmed Badreldin+15 more
wiley +1 more source
EMRlog method for computer security for electronic medical records with logic and data mining. [PDF]
Martínez Monterrubio SM+2 more
europepmc +1 more source
Report: 4th ACM Conference On Computer and Communications Security [PDF]
Donald J. Reifer
openalex +1 more source