Results 161 to 170 of about 5,973,902 (354)
Computer abuse and security: Update on an empirical pilot study [PDF]
Detmar W. Straub
openalex +1 more source
SPAN security policies and guidelines [PDF]
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure.
Green, James L., Sisson, Patricia L.
core +1 more source
Low‐Velocity Penetration Impact Behavior of Triply Periodic Minimal Surface Strut‐Based Lattices
Triply periodic minimal surface (TPMS)‐based lattices are gaining attention for their multifunctional properties in applications as aeronautics and automotive, which involve low‐velocity impact loading. This work evaluates the low‐velocity penetration impact behavior of five distinct TPMS architectures.
Lucía Doyle+2 more
wiley +1 more source
Formal specification of fault-tolerance and its relation to computer security [PDF]
Dorian Weber
openalex +1 more source
Sicurezza nelle reti: utilizzo di architetture multi-core per il monitoraggio del traffico IP [PDF]
The IP packet capture activity has always assumed great importance in the computer networks security. It's daily used in fact to monitor and analyze the IP traffic passing through a computer networks with the purpose to identify anomalous behaviors that ...
Mezzalama, Marco+2 more
core
A study of mechanical properties and fractography of PBF‐LB/M‐built Inconel 718, performing heat treatments and hot‐isostatic pressing, is presented. Ultimate tensile strength and fatigue behavior are evaluated, examining differences in maximum load behavior, elongation, and regimes of fatigue.
David Sommer+3 more
wiley +1 more source
Laboratory protocols for producing thin‐film pH electrodes for sterilized single‐use technologies have been successfully developed into a semiautomated workflow, with higher throughput and precision of membrane thickness. Accuracies are within 0.05 pH units versus ground truth, and uncertainty analysis reveals the largest sources of error to be derived
Bingyuan Zhao+4 more
wiley +1 more source
A highly‐entangled polyacrylamide (HE‐PAM) hydrogel is designed as an aqueous electrolyte for the fast charging/discharging properties in Zn/MnO2 batteries. Such hydrogel electrolyte possessed excellent mechanical characters, stable cycling capability, and superb rate performance under high current densities. These characters can also be applied in the
Zhaoxi Shen+11 more
wiley +1 more source
Efficient Simulation of Quantum Secure Multiparty Computation [PDF]
One of the key characteristics of secure quantum communication is quantum secure multiparty computation. In this paper, we propose a quantum secure multiparty summation (QSMS) protocol that can be applied to many complex quantum operations. It is based on the $(t, n)$ threshold approach.
arxiv