Results 31 to 40 of about 205,649 (344)
Brainjacking. Aspekty karnoprawne
With the development of technology, the appearance of new threats for the security of society and individuals may be observed. Brainjacking, understood as unauthorised access to brain implants, may become one of them.
Agata Ziobroń
doaj +1 more source
From cyber-security deception to manipulation and gratification through gamification [PDF]
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3].
DM Buss +8 more
core +4 more sources
Hacking in the university: contesting the valorisation of academic labour [PDF]
In this article I argue for a different way of understanding the emergence of hacker culture. In doing so, I outline an account of ‘the university’ as an institution that provided the material and subsequent intellectual conditions that early hackers ...
Winn, Joss
core +2 more sources
Recycling Argon through Metamorphic Reactions: the Record in Symplectites [PDF]
The 40Ar/39Ar ages of metamorphic micas that crystallized at high temperatures are commonly interpreted as cooling ages, with grains considered to have lost 40Ar via thermally-driven diffusion into the grain boundary network.
Allaz +82 more
core +2 more sources
Clinical Impact of NOTCH3 Variant Location After First Stroke in CADASIL
ABSTRACT Objective Despite its monogenic origin, Cerebral Autosomal Dominant Arteriopathy with Subcortical Infarcts and Leukoencephalopathy exhibits marked variability in clinical expression and severity. Variants in the NOTCH3 gene, within epidermal growth factor‐like repeat domains 1–6 or 7–34, are known to influence disease onset, but their impact ...
Léa Aguilhon +5 more
wiley +1 more source
Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu +2 more
core
One of the challenges of working with students across a college campus is achieving consistency with instruction. Student writers learn varied methods for revision and receive different (and often ineffective) kinds of feedback on their writing.
Mills, Gayla
core +1 more source
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj +8 more
wiley +1 more source
Neuromyths for educational research and the educational field [PDF]
status ...
Smeyers, Paulus
core +2 more sources
Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich +3 more
wiley +1 more source

