Results 111 to 120 of about 3,238,646 (347)

Information Flow for Security in Control Systems

open access: yes, 2016
This paper considers the development of information flow analyses to support resilient design and active detection of adversaries in cyber physical systems (CPS). The area of CPS security, though well studied, suffers from fragmentation.
Datta, Anupam   +3 more
core   +1 more source

Carbon Nanotube 3D Integrated Circuits: From Design to Applications

open access: yesAdvanced Functional Materials, EarlyView.
As Moore's law approaches its physical limits, carbon nanotube (CNT) 3D integrated circuits (ICs) emerge as a promising alternative due to the miniaturization, high mobility, and low power consumption. CNT 3D ICs in optoelectronics, memory, and monolithic ICs are reviewed while addressing challenges in fabrication, design, and integration.
Han‐Yang Liu   +3 more
wiley   +1 more source

Roulette‐Inspired Physical Unclonable Functions: Stochastic yet Deterministic Multi‐Bit Patterning through the Solutal Marangoni Effect

open access: yesAdvanced Functional Materials, EarlyView.
Geometric multi‐bit patterning based on dynamic wetting and dewetting phenomena creates roulette‐like Physical Unclonable Function (PUF) labels with stochastic yet deterministic properties. This method leverages the solutal‐Marangoni effect for high randomness while achieving deterministic multinary patterns through polygonal confinement of binary ...
Yeongin Cho   +8 more
wiley   +1 more source

A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing

open access: yesIET Information Security
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability.
Canling Wang   +8 more
doaj   +1 more source

How Hackers Try to Trick You [PDF]

open access: yes
As cyber-attacks continue to become more sophisticated, University of Maine System (UMS) employees need to be vigilant and aware of the multitude of ways hackers can gain access to sensitive information.
UMS Information Security   +1 more
core   +1 more source

Highly Efficient 3D‐Printed PVDF‐Based Triboelectric Nanogenerators Featuring Polymorphic Perovskite Nanofillers

open access: yesAdvanced Functional Materials, EarlyView.
This study demonstrates the use of a low‐cost 3D printing technique to prepare a large‐area PVDF‐FAPbI3 composite dielectric film for flexible TENG application. The δ→α phase transformation of the FAPbI3 nanofillers has significantly improved the β‐phase content, morphology, and dielectric properties of the PVDF film.
Nurfatin Hafizah Zain Karimy   +7 more
wiley   +1 more source

The NPFIT strategy for information security of care record service [PDF]

open access: yes, 2011
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core  

Information security

open access: yes
This presentation provides insights into information security by UZH's Chief Information Security Officer, Oli Schmid.
openaire   +2 more sources

Structured, Shaped, or Printed Single‐Atom Catalysts and Their Applications

open access: yesAdvanced Functional Materials, EarlyView.
This paper reviews the design and use of structured single‐atom catalysts, which integrate porous architectures with the exceptional reactivity of isolated catalytic sites. It explores fabrication strategies, advanced characterization methods, and support materials that enhance thermal stability, mechanical robustness, and operational efficiency of ...
Jiachengjun Luo   +4 more
wiley   +1 more source

Author Correction: Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation

open access: yesScientific Reports, 2023
Yifan Wang   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy