Results 271 to 280 of about 4,280,872 (404)

Sex Estimation Through Orbital Measurements: A Machine Learning Approach for Forensic Science. [PDF]

open access: yesDiagnostics (Basel)
Triantafyllou G   +7 more
europepmc   +1 more source

Waxy‐ or Putty‐Like Materials as a Novel Drug Preparation for Synthetic Cannabinoid Receptor Agonists: Detection in Prisons and In Vitro Cannabinoid Receptor Activity

open access: yesDrug Testing and Analysis, EarlyView.
Waxy‐ or putty‐like materials has emerged as a novel drug preparation for synthetic cannabinoids and other drugs in UK prisons. An in vitro CB1 bioassay was used to evaluate the CB1 activating potential of MDMB‐INACA and extracts from eight seized samples. MDMB‐INACA had moderate efficacy but low potency at CB1.
Axelle Timmerman   +9 more
wiley   +1 more source

Non‐traditional encryption methods: Moving toward electrochemical cryptography

open access: yesElectrochemical Science Advances, Volume 2, Issue 6, December 2022., 2022
Abstract Cybersecurity and encryption are critical in diverse applications from simple emails to high‐priority government secrets. It is best accomplished by an “unbreakable” cipher or one which is only decrypted by those with a matching cipher key to the initial encryption.
Giana Biddle   +2 more
wiley   +1 more source

Stylometry and forensic science: A literature review. [PDF]

open access: yesForensic Sci Int Synerg
Cammarota V   +3 more
europepmc   +1 more source

Further Investigation Into an Environmental Source for Aminorex

open access: yesDrug Testing and Analysis, EarlyView.
The results provide evidence that resedine is an intermediary compound between barbarin and aminorex in horses and that resedine can be used as a biomarker to eliminate the reporting of aminorex positives originating from the ingestion of plants from the Brassicaceae family.
Lydia Brooks   +3 more
wiley   +1 more source

Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph

open access: yesEngineering Reports, Volume 4, Issue 12, December 2022., 2022
We propose a mission‐centric approach to assessing the risks of cyber attacks on the organization's mission and provide decision support to network security administrators. Our approach uses a unique stochastic model that connects vulnerability impacts to the mission's security requirements and allows selecting the most resilient configuration of ...
Michal Javorník, Martin Husák
wiley   +1 more source

Forensic science capacity development: A case study of Timor-Leste. [PDF]

open access: yesForensic Sci Int Synerg
Howes LM   +3 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy