Results 111 to 120 of about 70,639 (257)

A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed   +4 more
wiley   +1 more source

Design and Implementation of XGBoost‐Based Cyberattack Detection and Blockchain‐Enabled Charging Station

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley   +1 more source

Frontiers of Blockchain Applications in HRM: An Exploration Through Theoretical Integration and Qualitative Inquiry

open access: yesAsia Pacific Journal of Human Resources, Volume 64, Issue 1, January 2026.
ABSTRACT Blockchain technology is a disruptive technology known for its use in financial services, supply chains and cryptocurrencies; however, it remains relatively underutilised in human resource management (HRM). This study aims to explore current and potential future uses of blockchain in strategic and operational HRM and examines the enablers and ...
Patricia Iglesias   +2 more
wiley   +1 more source

T/Key: Second-Factor Authentication From Secure Hash Chains [PDF]

open access: green, 2017
Dmitry Kogan, Nathan Manohar, Dan Boneh
openalex   +1 more source

Linking the NETSARC+ National Sarcoma Database With the SNDS to Evaluate Adjuvant and/or Neoadjuvant Therapy: Report on the Linkage Process and Result (Health Data Hub's DEEPSARC Pilot Project)

open access: yesFundamental &Clinical Pharmacology, Volume 40, Issue 1, January 2026.
ABSTRACT Background DEEPSARC, one of the first projects running on the Health Data Hub, aimed to identify real‐life treatment regimens that could improve overall survival. The project is based on matching the national database of the sarcoma reference network with the SNDS.
Erwan Drezen   +12 more
wiley   +1 more source

Exploring collagen fibrillogenesis at the nanoscale: Tip‐enhanced Raman imaging of protofibrils

open access: yesJournal of Microscopy, Volume 301, Issue 1, Page 12-19, January 2026.
Abstract Collagen, a key structural component of the extracellular matrix, assembles through a hierarchical process of fibrillogenesis. Despite extensive studies on mature collagen fibrils, intermediates such as protofibrils remain underexplored, particularly at the nanoscale.
Maria A. Paularie   +5 more
wiley   +1 more source

Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley   +1 more source

Selective Location Blinding Using Hash Chains (Transcript of Discussion) [PDF]

open access: yes, 2011
The work that I am reporting on is work that we recently started with a Luxembourgish company, itrust. Together with this company we are working on the design of a security architecture and security protocols to enable location-based services. The general architecture of the system consists of a satellite and a local user device, such as a mobile ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy