Results 91 to 100 of about 77,587 (303)

EvilPromptFuzzer: generating inappropriate content based on text-to-image models

open access: yesCybersecurity
Text-to-image (TTI) models provide huge innovation ability for many industries, while the content security triggered by them has also attracted wide attention. Considerable research has focused on content security threats of large language models (LLMs),
Juntao He   +9 more
doaj   +1 more source

A Vulnerability Scanning Method for Web Services in Embedded Firmware

open access: yesApplied Sciences
As the Internet of Things (IoT) era arrives, the proliferation of IoT devices exposed to the Internet presents a significant challenge to device security.
Xiaocheng Ma   +4 more
doaj   +1 more source

Securing cyberspace [PDF]

open access: yesConcurrency and Computation: Practice and Experience, 2015
Gang Li   +5 more
openaire   +1 more source

Is today's architecture about real space, virtual space or what? [PDF]

open access: yes, 2008
Nowadays digital technologies and information and telecommunication technologies are widely used in every aspect of our lives. This article focuses on the digital technologies and their effect on the place-making activities.
Thompson, Emine Mine
core  

Wafer‐Scale Synthesis of Molecularly Engineered 2D Covalent Organic Framework Films for Highly‐Sensitive and Rapid‐Response Humidity Sensing

open access: yesAdvanced Materials, EarlyView.
We report molecularly engineered 2D COF films for high‐performance humidity sensors. The developed COFTPT‐THTA ultrathin film features triazine‐functionalized π‐conjugated backbones and high‐density surface hydroxyl groups. This unique architecture facilitates an electron‐proton coupled transport mechanism.
Liangyu Dong   +16 more
wiley   +1 more source

A Portrait of the Internet as a Young Man [PDF]

open access: yes, 2010
In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative ...
Bartow, Ann
core   +1 more source

Positively Charged Polymer‐Brush MOFs for Large‐Area, Pressure‐Resistant Gas Separation Membranes

open access: yesAdvanced Materials, EarlyView.
A universal POPA strategy enables positively charged polymer‐brush MOFs with self‐adaptive interfacial interlocking to resist aggregation under fast processing. This design ensures seamless dispersion within large‐area selective layers, achieving 1 m‐wide roll‐to‐roll fabrication of pressure‐resistant MMCMs with tunable CO2 separation performance ...
Yi Yang   +11 more
wiley   +1 more source

On Security in Cyberspace

open access: yesPolish Political Science Yearbook, 2021
Book Review: Magdalena Molendowska, Rafał Miernik (Eds.), Bezpieczeństwo w cyberprzestrzeni.
openaire   +1 more source

Advancing the Landscape of RNAi Nanotherapeutics for Ischemic Heart Disease

open access: yesAdvanced Materials, EarlyView.
RNA interference (RNAi) nanomedicine revolutionizes treatment regimens for ischemic heart diseases by enabling tailored, sequence‐anchored gene regulation. This review highlights the recent advances in nanotechnology‐driven RNAi therapeutics for myocardial ischemia and discusses the key design principles that govern efficient delivery, providing ...
Han Gao, Da Pan, Hélder A. Santos
wiley   +1 more source

Innovation Meets Accessibility in Melt Electrowriting 3D Printer Design: Continuous Process Monitoring and Automation via Modular Software and Hardware

open access: yesAdvanced Materials Technologies, EarlyView.
This manuscript describes the design and validation of an innovative melt electrowriting printer. With a turntable collector and modular software architecture, it unifies previous advanced MEW printer capabilities and enhances adaptability for a wide range of research applications.
Timo Baroth   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy