Results 61 to 70 of about 702,907 (282)

A Robust Information Life Cycle Management Framework for Securing and Governing Critical Infrastructure Systems

open access: yesInventions, 2018
In modern societies, the rampant growth of the Internet, both on the technological and social level, has created fertile ground for the emergence of new types of risk.
Vrettos Moulos   +16 more
doaj   +1 more source

Cyber security management of critical energy infrastructure in national cybersecurity strategies: cases of USA, UK, France, Estonia and Lithuania

open access: yesInsights into Regional Development, 2020
The progresses made in terms of cybersecurity in these past years have been huge, and the implementation of newer strategies has brought interesting results all over the globe.
Manuela Tvaronavičienė   +3 more
doaj   +1 more source

The role of police in protection of critical infrastructure in the Republic of Macedonia [PDF]

open access: yesBezbednosni Dijalozi, 2017
Police as a state body is responsible for the protection of life, personal safety and property of citizens, maintaining a stable security situation, maintaining public law and order and law enforcement.
Tony Stankovski
doaj   +1 more source

Ethics and privacy issues of critical infrastructure protection – risks and possible solutions through standardization [PDF]

open access: yes, 2014
Dieser Beitrag ist mit Zustimmung des Rechteinhabers aufgrund einer (DFG geförderten) Allianz- bzw. Nationallizenz frei zugänglich.This publication is with permission of the rights owner freely accessible due to an Alliance licence and a national licence
Wurster, Simone
core   +1 more source

Atomic Size Misfit for Electrocatalytic Small Molecule Activation

open access: yesAdvanced Functional Materials, EarlyView.
This review explores the application and mechanisms of atomic size misfit in catalysis for small molecule activation, focusing on how structural defects and electronic properties can effectively lower the energy barriers of chemical bonds in molecules like H2O, CO2, and N2.
Ping Hong   +3 more
wiley   +1 more source

Unassisted Photoelectrochemical Hydrogen Production Coupled with Selective Glucose Oxidation Using Metal Halide Perovskite Photoanodes

open access: yesAdvanced Functional Materials, EarlyView.
A metal halide perovskite‐based photoanode integrated with a CoNiFe layered double hydroxide (LDH) cocatalyst is reported for selective glucose oxidation reaction (GOR), achieving simultaneous and unassisted photoelectrochemical hydrogen production. This system delivers high photocurrent density, excellent Faradaic efficiency of GOR, and strong techno ...
Shujie Zhou   +12 more
wiley   +1 more source

Security and the performative politics of resilience : critical infrastructure protection and humanitarian emergency preparedness [PDF]

open access: yes, 2015
This article critically examines the performative politics of resilience in the context of the current UK Civil Contingencies (UKCC) agenda. It places resilience within a wider politics of (in)security that seeks to govern risk by folding uncertainty ...
Brassett, James, Vaughan-Williams, Nick
core   +1 more source

Composites of Shellac and Silver Nanowires as Flexible, Biobased, and Corrosion‐Resistant Transparent Conductive Electrodes

open access: yesAdvanced Functional Materials, EarlyView.
Shellac, a centuries‐old natural resin, is reimagined as a green material for flexible electronics. When combined with silver nanowires, shellac films deliver transparency, conductivity, and stability against humidity. These results position shellac as a sustainable alternative to synthetic polymers for transparent conductors in next‐generation ...
Rahaf Nafez Hussein   +4 more
wiley   +1 more source

Validating secure and reliable IP/MPLS communications for current differential protection [PDF]

open access: yes, 2016
Current differential protection has stringent real-time communications requirements and it is critical that protection traffic is transmitted securely, i.e., by using appropriate data authentication and encryption methods.
Blair, S.M.   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy