Results 61 to 70 of about 77,587 (303)

Double landmines: invisible textual backdoor attacks based on dual-trigger

open access: yesCybersecurity
Backdoor attacks pose an important security threat to textual large language models. Exploring textual backdoor attacks not only helps reveal the potential security risks of models, but also promotes innovation and development of defense mechanisms ...
Yang Hou   +5 more
doaj   +1 more source

A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing

open access: yesMathematics
With the rapid development of artificial intelligence, multi-party collaboration based on data sharing has become an inevitable trend. However, in practical applications, shared data often originate from multiple providers.
Kunyang Li   +7 more
doaj   +1 more source

Securing Cyberspace

open access: yes, 2017
Cyber-security is thus a very serious issue. Attacks can have catastrophic consequences. The cyber-war is for real. Greater legal certainty, less confrontation between departments and more cooperation between governments, is the call of the hour. India has to make cyber-security a priority, if the government wants to go digital. Attitudes and behaviour
openaire   +1 more source

Persuasive technology and digital design for behaviour change [PDF]

open access: yes, 2012
Copyright @ 2012 Social Science Research NetworkThe convergence of the 'digital' and 'real' worlds has been rapid and transformative of everyday life, as well as design practice - to the extent that talking about 'digital design' and 'the digital context'
Lockton, D
core   +2 more sources

Atomic Layer Deposition in Transistors and Monolithic 3D Integration

open access: yesAdvanced Functional Materials, EarlyView.
Transistors are fundamental building blocks of modern electronics. This review summarizes recent progress in atomic layer deposition (ALD) for the synthesis of two‐dimensional (2D) metal oxides and transition‐metal dichalcogenides (TMDCs), with particular emphasis on their enabling role in monolithic three‐dimensional (M3D) integration for next ...
Yue Liu   +5 more
wiley   +1 more source

Perspectives for Cyber Strategists on Law for Cyberwar [PDF]

open access: yes, 2011
The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber ...
Dunlap, Charles J., Jr.
core   +1 more source

EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]

open access: yes, 2020
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core  

A Mechanistic Blueprint for Fast, High‐Yield Green Scintillators Using Conjugated Polymer–Nanocrystal Composites

open access: yesAdvanced Functional Materials, EarlyView.
Conjugated polymer–nanocrystal composites are investigated to develop fast, high‐yield green scintillators. The polymer F8BT enables efficient, ultrafast emission, while blends with non‐emitting HfO2 nanocrystals and luminescent CdZnS/ZnS quantum dots reveal distinct sensitization mechanisms.
Chenger Wang   +13 more
wiley   +1 more source

Exploring the Fractal Space of Sparse Deep Neural Network

open access: yesIEEE Access
Sparse deep neural networks (DNNs) are preferable in many real-world applications, especially edge computing. How to find the sparse structure of deep neural networks so that the model can achieve better performance is an important research topic.
Hang Xu   +5 more
doaj   +1 more source

Unlocking the Doors Feminist Insights for Inclusion in Governance, Peace and Security [PDF]

open access: yes, 2016
This is the third primer in the series. It analyses the successes and gaps in women's movements' approaches to the intersections between governance and the security complex.
Awino Okech
core  

Home - About - Disclaimer - Privacy