Results 211 to 220 of about 815,217 (293)
Learning Security through Computer Games: Studying user behavior in a real-world situation [PDF]
Kjell Näckros
openalex +1 more source
Defects in Inorganic Mechanoluminescent Phosphors: Insights and Impacts
Mechanoluminescence is attracting more attention recently, and defect dominates mechanoluminescence performances. Investigating how defects work in the mechanoluminescence process is crucial for elucidating its complex luminescence mechanism. This review aims to emphasize the fundamental role of defects in mechanoluminescence, which offers an ...
Wenhao Li+3 more
wiley +1 more source
Advances to IoT security using a GRU-CNN deep learning model trained on SUCMO algorithm. [PDF]
Sagu A+5 more
europepmc +1 more source
A Review of: “Real Digital Forensics: Computer Security and Incident Response. By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose” [PDF]
Nicole Beebe, Gary C. Kessler
openalex +1 more source
A multi‐layered anti‐counterfeiting platform is developed based on an azopolymer (PAzo) system. By leveraging the molecular orientation control of PAzo under linearly polarized light (LPL), encrypted patterns are fabricated that remain invisible under standard conditions and require polarized optical microscopy (POM) for decryption.
Ming‐Hsuan Chang+10 more
wiley +1 more source
A Complementary Approach for Securing and Anti-Counterfeiting of Valuable Documents Based on Encryption of Computer-Generated Hologram. [PDF]
Ahmed ZE+6 more
europepmc +1 more source
A scalable nano‐/micro‐confinement strategy is developed, where polyacrylamide (PAM)‐LiCl hybrid desiccants are confined within hollow nanoparticles (HNPs) and assembled into raspberry‐like microbeads. The beads have a hydrogel‐rich core and an NP‐rich shell for fast absorption and desorption, releasing water 13.6 L kg⁻¹ day⁻¹.
Yunchan Lee+6 more
wiley +1 more source
A flexible and lightweight signcryption scheme for underwater wireless sensor networks. [PDF]
Shah S+8 more
europepmc +1 more source
An Analysis of the Growth of Computer and Internet Security Breaches
Kallol Bagchi, Godwin Udo
openalex +2 more sources