Results 291 to 300 of about 5,973,902 (354)
Molecular Domino Toppling for Directed Self‐Erasing Information Transfer
An azobenzene‐based material with unprecedented light‐pumped directional charge‐transfer reminiscent of toppling dominoes is presented. After light‐induced trans→cis forward isomerization, electron hopping occurs in a sequential and propagating manner between the cis isomers along with an electrocatalytic cis→trans backward isomerization.
Ying Li+7 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
With the growing requirements for protection generated by legislation such as the 1974 Privacy Act, the increasing complexity of computer and data communications applications, and increasing awareness regarding computer vulnerabilities, the discipline of computer security is achieving independent recognition.
openaire +3 more sources
Deception Techniques in Computer Security
ACM Computing Surveys, 2018A recent trend both in academia and industry is to explore the use of deception techniques to achieve proactive attack detection and defense—to the point of marketing intrusion deception solutions as zero-false-positive intrusion detection.
Xiao Han, Nizar Kheir, D. Balzarotti
semanticscholar +1 more source
Habituation effects in computer security warning
Information Security Journal, 2018Security warning is a form of computer dialog communication used to inform the users on the risks of allowing random applications to run on a computer system. Accordingly, it is specifically designed to impersonate a legitimate security alerting function
Ammar Amran, Z. Zaaba, M. Singh
semanticscholar +1 more source
IEEE Security & Privacy Magazine, 2004
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
J.A. Whittaker, M. Andrews
openaire +2 more sources
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
J.A. Whittaker, M. Andrews
openaire +2 more sources
WIREs Computational Statistics, 2010
AbstractComputer security encompasses concepts and methods for protecting sensitive resources in computer systems. Computer security starts from the policies that regulate access to protected resources. In technology, the focus is on mechanisms for enforcing these policies.
openaire +2 more sources
AbstractComputer security encompasses concepts and methods for protecting sensitive resources in computer systems. Computer security starts from the policies that regulate access to protected resources. In technology, the focus is on mechanisms for enforcing these policies.
openaire +2 more sources
Computing the value of security
IEE Proceedings - Generation, Transmission and Distribution, 2002Power systems are operated with some margin of security to ensure that the most likely losses of plant will not cause interruptions to supply. However, this security margin has a cost that may not be justified by the benefit in terms of prevention of lost load.
Kirschen, D.+4 more
openaire +5 more sources
Security for Ubiquitous Computing
2008Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of ...
Tobias Straub, Andreas Heinemann
openaire +2 more sources
Cloud Computing Security [PDF]
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently ...
Sean Carlin, Kevin Curran
openaire +1 more source