Results 61 to 70 of about 1,657,998 (333)

Framing of cybercrimes in russian and english media texts

open access: yesВестник Самарского университета: История, педагогика, филология, 2020
Covering the incidents of cyber attacks, mass media inform the public about possible security threats and form the conventional knowledge of cyber criminals and their motives.
D. I. Imamgaiazova
doaj   +1 more source

The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]

open access: yes, 2012
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core   +1 more source

A Review on Biodegradable Materials of Sustainable Soft Robotics and Electronics

open access: yesAdvanced Science, EarlyView.
Biodegradable materials are gaining increasing attention in soft robotics and electronics due to their environmental friendliness, showing great potential for sustainability. In this review, the classification of biodegradable materials, their applications in the field of soft robotics and electronics, as well as the challenges and future prospects ...
Yizhu Xie   +8 more
wiley   +1 more source

Stabilization of the Benzene Radical Trianion in an Inverse‐Sandwich Yttrium Complex

open access: yesAngewandte Chemie, EarlyView.
A new type of benzene anion state is born: The unprecedented benzene radical trianion embedded in an inverse‐sandwich yttrium complex was synthesized by a one‐electron chemical reduction of its benzene dianion precursor using potassium graphite in the presence of [2.2.2]‐cryptand.
Weiqing Mao   +5 more
wiley   +2 more sources

Cyber Operations in Peace and War: A Framework for Persistent Engagement

open access: yesInternational Conference on Cyber Warfare and Security
During 1990s, the concept of information warfare (IW) and information operations (including cyber operations, psychological operations, and electronic warfare) could be conducted with varying intensity across all stages of peace and conflict.
Brett van Niekerk
semanticscholar   +1 more source

Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics

open access: yesAdvanced Science, EarlyView.
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu   +9 more
wiley   +1 more source

Cyber Technology and the Arms Race [PDF]

open access: yes, 2018
Cyber technology represents digital military capability with the purpose of causing damage to the military strength of a potential enemy. War using conventional weapons may be preceded by or combined with a strike using cyber technology.
Kanniainen, Vesa
core  

Internet of Things Behavioral-Economic Security Design, Actors & Cyber War

open access: yes, 2017
Using security incident history we identify threats to and using the IoT and other ubiquitous devices emerging since 2012, gaining widespread recognition in 2016, and only lightly addressed in either IoT security literature or the press.
Robert L. Shuler, Billy G. Smith
semanticscholar   +1 more source

Systematic Benchmarking of a Noise‐Tolerant Conductive Hydrogel Electrode for Epidermal Bioelectronics

open access: yesAdvanced Science, EarlyView.
General schematic of the approach. Abstract Conventional Silver/Silver Chloride (Ag/AgCl) electrodes remain the clinical standard for electrophysiological monitoring but are hindered by poor skin conformity, mechanical rigidity, and signal degradation, particularly under motion or sweat.
Nazmi Alsaafeen   +11 more
wiley   +1 more source

Cyber terrorism and war, the looming threat to the industrialised state [PDF]

open access: yes, 2011
Earlier this month the EastWest Institute held its second worldwide summit on cyber security. Hundreds of government and industry leaders, from over 43 countries, attended to discuss the looming threat of increasing war and criminality within the cyber ...
Brown, AD
core  

Home - About - Disclaimer - Privacy