Results 101 to 110 of about 1,275,223 (320)
Temperature‐Resilient Polymeric Memristors for Effective Deblurring in Static and Dynamic Imaging
A thermally stable organic memristor based on a thiadiazolobenzotriazole (TBZ) and 2,5‐Dioctyl‐3,6‐di(thiophen‐2‐yl)pyrrolo[3,4‐c]pyrrole‐1,4(2H,5H)‐dione (DPP)‐based conjugated polymer is presented, demonstrating reliable, gradual resistance switching across a wide temperature range (153–573 K).
Ziyu Lv+15 more
wiley +1 more source
Digital Health in Physicians' and Pharmacists' Office: A Comparative Study of e-Prescription Systems' Architecture and Digital Security in Eight Countries. [PDF]
Aldughayfiq B, Sampalli S.
europepmc +1 more source
Cybersecurity and Forensic Analysis of IP-Cameras Used in Saudi Arabia
In smart city infrastructure, IP cameras play a pivotal role in crime prevention and detection. However, not much research has been conducted on IP cameras from a cybersecurity and forensics perspective.
Istabraq M. Alshenaif+3 more
doaj +1 more source
New digital signature protocol based on elliptic curves [PDF]
In this work, a new digital signature based on elliptic curves is presented. We established its efficiency and security. The method, derived from a variant of ElGamal signature scheme, can be seen as a secure alternative protocol if known systems are completely broken.
arxiv
Structured, Shaped, or Printed Single‐Atom Catalysts and Their Applications
This paper reviews the design and use of structured single‐atom catalysts, which integrate porous architectures with the exceptional reactivity of isolated catalytic sites. It explores fabrication strategies, advanced characterization methods, and support materials that enhance thermal stability, mechanical robustness, and operational efficiency of ...
Jiachengjun Luo+4 more
wiley +1 more source
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee+2 more
doaj +1 more source
Individual Risk Management for Digital Payment Systems [PDF]
Despite existing security standards and security technologies, such as secure hardware, gaps between users’ demand for security and the security offered by a payment system can still remain. These security gaps imply risks for users.
I. Pippow+3 more
core
The study explores for the first time the use of polyvinyl butyral (PVB), particularly recycled PVB, as a sustainable binder for Li/Na‐based electrodes in the framework of the H2020 SUNRISE EU project. Findings revealed that electrodes bound with a sustainable PAA/PVB mixture demonstrated exceptional rate capability and high initial Coulombic ...
Hamideh Darjazi+4 more
wiley +1 more source
Android Malware Detection Based on Informative Syscall Subsequences
The Android operating system commands a dominant market share of over 70% in the smartphone industry. However, this widespread usage has resulted in a concerning increase in malware applications.
Roopak Surendran+3 more
doaj +1 more source
Self-sovereign Identity $-$ Opportunities and Challenges for the Digital Revolution [PDF]
The interconnectedness of people, services and devices is a defining aspect of the digital revolution, and, secure digital identities are an important prerequisite for secure and legally compliant information exchange. Existing approaches to realize a secure identity management focus on central providers of identities such as national authorities or ...
arxiv