Results 101 to 110 of about 1,275,223 (320)

Temperature‐Resilient Polymeric Memristors for Effective Deblurring in Static and Dynamic Imaging

open access: yesAdvanced Functional Materials, EarlyView.
A thermally stable organic memristor based on a thiadiazolobenzotriazole (TBZ) and 2,5‐Dioctyl‐3,6‐di(thiophen‐2‐yl)pyrrolo[3,4‐c]pyrrole‐1,4(2H,5H)‐dione (DPP)‐based conjugated polymer is presented, demonstrating reliable, gradual resistance switching across a wide temperature range (153–573 K).
Ziyu Lv   +15 more
wiley   +1 more source

Cybersecurity and Forensic Analysis of IP-Cameras Used in Saudi Arabia

open access: yesJournal of Information Security and Cybercrimes Research
In smart city infrastructure, IP cameras play a pivotal role in crime prevention and detection. However, not much research has been conducted on IP cameras from a cybersecurity and forensics perspective.
Istabraq M. Alshenaif   +3 more
doaj   +1 more source

New digital signature protocol based on elliptic curves [PDF]

open access: yesInternational Journal on Cryptography and Information Security (2012), 2013
In this work, a new digital signature based on elliptic curves is presented. We established its efficiency and security. The method, derived from a variant of ElGamal signature scheme, can be seen as a secure alternative protocol if known systems are completely broken.
arxiv  

Structured, Shaped, or Printed Single‐Atom Catalysts and Their Applications

open access: yesAdvanced Functional Materials, EarlyView.
This paper reviews the design and use of structured single‐atom catalysts, which integrate porous architectures with the exceptional reactivity of isolated catalytic sites. It explores fabrication strategies, advanced characterization methods, and support materials that enhance thermal stability, mechanical robustness, and operational efficiency of ...
Jiachengjun Luo   +4 more
wiley   +1 more source

Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World

open access: yesIEEE Access
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee   +2 more
doaj   +1 more source

Individual Risk Management for Digital Payment Systems [PDF]

open access: yes
Despite existing security standards and security technologies, such as secure hardware, gaps between users’ demand for security and the security offered by a payment system can still remain. These security gaps imply risks for users.
I. Pippow   +3 more
core  

Using Recycled Materials in a Novel Dual Binder System for Hard Carbon Anodes: Closing the Loop Toward Sustainable Li‐/Na‐ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
The study explores for the first time the use of polyvinyl butyral (PVB), particularly recycled PVB, as a sustainable binder for Li/Na‐based electrodes in the framework of the H2020 SUNRISE EU project. Findings revealed that electrodes bound with a sustainable PAA/PVB mixture demonstrated exceptional rate capability and high initial Coulombic ...
Hamideh Darjazi   +4 more
wiley   +1 more source

Android Malware Detection Based on Informative Syscall Subsequences

open access: yesIEEE Access
The Android operating system commands a dominant market share of over 70% in the smartphone industry. However, this widespread usage has resulted in a concerning increase in malware applications.
Roopak Surendran   +3 more
doaj   +1 more source

Self-sovereign Identity $-$ Opportunities and Challenges for the Digital Revolution [PDF]

open access: yesarXiv, 2017
The interconnectedness of people, services and devices is a defining aspect of the digital revolution, and, secure digital identities are an important prerequisite for secure and legally compliant information exchange. Existing approaches to realize a secure identity management focus on central providers of identities such as national authorities or ...
arxiv  

Home - About - Disclaimer - Privacy