Results 61 to 70 of about 1,657,998 (333)
Framing of cybercrimes in russian and english media texts
Covering the incidents of cyber attacks, mass media inform the public about possible security threats and form the conventional knowledge of cyber criminals and their motives.
D. I. Imamgaiazova
doaj +1 more source
The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core +1 more source
A Review on Biodegradable Materials of Sustainable Soft Robotics and Electronics
Biodegradable materials are gaining increasing attention in soft robotics and electronics due to their environmental friendliness, showing great potential for sustainability. In this review, the classification of biodegradable materials, their applications in the field of soft robotics and electronics, as well as the challenges and future prospects ...
Yizhu Xie +8 more
wiley +1 more source
Stabilization of the Benzene Radical Trianion in an Inverse‐Sandwich Yttrium Complex
A new type of benzene anion state is born: The unprecedented benzene radical trianion embedded in an inverse‐sandwich yttrium complex was synthesized by a one‐electron chemical reduction of its benzene dianion precursor using potassium graphite in the presence of [2.2.2]‐cryptand.
Weiqing Mao +5 more
wiley +2 more sources
Cyber Operations in Peace and War: A Framework for Persistent Engagement
During 1990s, the concept of information warfare (IW) and information operations (including cyber operations, psychological operations, and electronic warfare) could be conducted with varying intensity across all stages of peace and conflict.
Brett van Niekerk
semanticscholar +1 more source
Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu +9 more
wiley +1 more source
Cyber Technology and the Arms Race [PDF]
Cyber technology represents digital military capability with the purpose of causing damage to the military strength of a potential enemy. War using conventional weapons may be preceded by or combined with a strike using cyber technology.
Kanniainen, Vesa
core
Internet of Things Behavioral-Economic Security Design, Actors & Cyber War
Using security incident history we identify threats to and using the IoT and other ubiquitous devices emerging since 2012, gaining widespread recognition in 2016, and only lightly addressed in either IoT security literature or the press.
Robert L. Shuler, Billy G. Smith
semanticscholar +1 more source
General schematic of the approach. Abstract Conventional Silver/Silver Chloride (Ag/AgCl) electrodes remain the clinical standard for electrophysiological monitoring but are hindered by poor skin conformity, mechanical rigidity, and signal degradation, particularly under motion or sweat.
Nazmi Alsaafeen +11 more
wiley +1 more source
Cyber terrorism and war, the looming threat to the industrialised state [PDF]
Earlier this month the EastWest Institute held its second worldwide summit on cyber security. Hundreds of government and industry leaders, from over 43 countries, attended to discuss the looming threat of increasing war and criminality within the cyber ...
Brown, AD
core

