Results 31 to 40 of about 205,649 (344)

Brainjacking. Aspekty karnoprawne

open access: yesActa Iuris Stetinensis, 2021
With the development of technology, the appearance of new threats for the security of society and individuals may be observed. Brainjacking, understood as unauthorised access to brain implants, may become one of them.
Agata Ziobroń
doaj   +1 more source

From cyber-security deception to manipulation and gratification through gamification [PDF]

open access: yes, 2019
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3].
DM Buss   +8 more
core   +4 more sources

Hacking in the university: contesting the valorisation of academic labour [PDF]

open access: yes, 2013
In this article I argue for a different way of understanding the emergence of hacker culture. In doing so, I outline an account of ‘the university’ as an institution that provided the material and subsequent intellectual conditions that early hackers ...
Winn, Joss
core   +2 more sources

Recycling Argon through Metamorphic Reactions: the Record in Symplectites [PDF]

open access: yes, 2018
The 40Ar/39Ar ages of metamorphic micas that crystallized at high temperatures are commonly interpreted as cooling ages, with grains considered to have lost 40Ar via thermally-driven diffusion into the grain boundary network.
Allaz   +82 more
core   +2 more sources

Clinical Impact of NOTCH3 Variant Location After First Stroke in CADASIL

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Despite its monogenic origin, Cerebral Autosomal Dominant Arteriopathy with Subcortical Infarcts and Leukoencephalopathy exhibits marked variability in clinical expression and severity. Variants in the NOTCH3 gene, within epidermal growth factor‐like repeat domains 1–6 or 7–34, are known to influence disease onset, but their impact ...
Léa Aguilhon   +5 more
wiley   +1 more source

Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]

open access: yes, 2012
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu   +2 more
core  

Getting Back to Basics [PDF]

open access: yes, 2007
One of the challenges of working with students across a college campus is achieving consistency with instruction. Student writers learn varied methods for revision and receive different (and often ineffective) kinds of feedback on their writing.
Mills, Gayla
core   +1 more source

Neuromorphic Electronics for Intelligence Everywhere: Emerging Devices, Flexible Platforms, and Scalable System Architectures

open access: yesAdvanced Materials, EarlyView.
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj   +8 more
wiley   +1 more source

Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy