Results 71 to 80 of about 1,657,998 (333)

Parametric Optimization of PEDOT:PSS Aerosol Jet Printing for Enhanced Line Morphology in Flexible Electronics

open access: yesAdvanced Electronic Materials, EarlyView.
This work maps and optimizes aerosol‐jet printing of PEDOT:PSS on flexible polyimide. By co‐tuning carrier and sheath gas flows, print speed, and solvent composition with surface activation, continuous, uniform microlines with sharp edges and minimal overspray are achieved.
Md Shariful Islam   +2 more
wiley   +1 more source

Cyber Warfare as a Use of Force against Third-Party Countries: The Perspective of International Law

open access: yesGroningen Journal of International Law
The use of force in international relations takes different forms and changes year by year due to the development of cyber technology. The problem mentioned in this study is that the Charter of the United Nations (UN Charter) and international law have ...
Tareq Hamid Al-Fahdawi
doaj   +1 more source

Cyber Deterrence by Punishment: Role of Different Perceptions [PDF]

open access: yes, 2018
Nuclear deterrence based on mutual assured destruction seems to have successfully prevented a global nuclear war for decades. Can deterrence be effective for cyber attacks between nation-states?
Al Azwani, N., Chen, T.
core  

Cyber War and Lessons from History in the Digital Age

open access: yesIntelligence and national security, 2018
Cyber Con ...
R. Hughes   +2 more
semanticscholar   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Perspectives for Cyber Strategists on Law for Cyberwar [PDF]

open access: yes, 2011
The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber ...
Dunlap, Charles J., Jr.
core   +1 more source

Toward Environmentally Friendly Hydrogel‐Based Flexible Intelligent Sensor Systems

open access: yesAdvanced Intelligent Discovery, EarlyView.
This review summarizes environmentally and biologically friendly hydrogel‐based flexible sensor systems focusing on physical, chemical, and physiological sensors. Furthermore, device concepts moving forward for the practical application are discussed about wireless integration, the interface between hydrogel and dry electronics, automatic data analysis
Sudipta Kumar Sarkar, Kuniharu Takei
wiley   +1 more source

Weaponization of data: the role of data in modern warfare

open access: yesBulletin of "Carol I" National Defense University
The 21st century is swamped with innumerable technologies distributed across different fields. Consequently, loads of data is being generated, transforming it into a tactical forte.
Dorcus Phanice OLASYA, Anita KIAMBA
doaj   +1 more source

From the Vanishing Point Back to the Core: The Impact of the Development of the Cyber Law of War on General International Law [PDF]

open access: yes, 2017
This is the final version of the chapter. Available from NATO CCD COE Publications via the link in this record.The law of war was famously described by Sir Hersch Lauterpacht as being ‘at the vanishing point of international law’.
Mačák, K
core   +1 more source

A Hybrid Transfer Learning Framework for Brain Tumor Diagnosis

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
A novel hybrid transfer learning approach for brain tumor classification achieves 99.47% accuracy using magnetic resonance imaging (MRI) images. By combining image preprocessing, ensemble deep learning, and explainable artificial intelligence (XAI) techniques like gradient‐weighted class activation mapping and SHapley Additive exPlanations (SHAP), the ...
Sadia Islam Tonni   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy