Results 201 to 210 of about 815,217 (293)

An artificial immune system architecture for computer security applications

open access: bronze, 2002
Paul K. Harmer   +3 more
openalex   +1 more source

A Validation of a Computer-Assisted Randomized Response Survey to Estimate the Prevalence of Fraud in Social Security [PDF]

open access: bronze, 2006
Gerty Lensvelt‐Mulders   +3 more
openalex   +1 more source

Composition and Resulting Band Alignment at the TiO2/InP Heterointerface: A Fundamental Study Combining Photoemission Spectroscopy and Theory

open access: yesAdvanced Functional Materials, EarlyView.
The chemical composition and band alignment are systematically investigated at the TiO2/InP heterointerface. Thin TiO2 films are deposited by ALD on atomically ordered, P‐terminated p‐InP(100). By combining UPS, XPS, and ab initio molecular dynamics, the atomistic structure and electronic alignment are revealed.
Mohammad Amin Zare Pour   +11 more
wiley   +1 more source

Digital health data security practices among health professionals in low-resource settings: cross-sectional study in Amhara Region, Ethiopia. [PDF]

open access: yesBMC Med Inform Decis Mak
Gebeyew AS   +8 more
europepmc   +1 more source

A Global Security Architecture for Intrusion Detection on Computer Networks [PDF]

open access: green, 2007
Abdoul Karim Ganame   +3 more
openalex   +1 more source

Flux‐Regulated Crystallization of Perovskites Using Machine Learning‐Predicted Solvent Evaporation Rates for X‐Ray Detectors

open access: yesAdvanced Functional Materials, EarlyView.
By integrating machine learning into flux‐regulated crystallization (FRC), accurate prediction of solvent evaporation rates in real time, improving crystallization control and reducing crystal growth variability by over threefold, is achieved. This enhances the reproducibility and quality of perovskite single crystals, leading to reproducible ...
Tatiane Pretto   +8 more
wiley   +1 more source

Heuristically enhanced multi-head attention based recurrent neural network for denial of wallet attacks detection on serverless computing environment. [PDF]

open access: yesSci Rep
Alzakari SA   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy