Results 111 to 120 of about 3,238,646 (347)
Information Flow for Security in Control Systems
This paper considers the development of information flow analyses to support resilient design and active detection of adversaries in cyber physical systems (CPS). The area of CPS security, though well studied, suffers from fragmentation.
Datta, Anupam+3 more
core +1 more source
Carbon Nanotube 3D Integrated Circuits: From Design to Applications
As Moore's law approaches its physical limits, carbon nanotube (CNT) 3D integrated circuits (ICs) emerge as a promising alternative due to the miniaturization, high mobility, and low power consumption. CNT 3D ICs in optoelectronics, memory, and monolithic ICs are reviewed while addressing challenges in fabrication, design, and integration.
Han‐Yang Liu+3 more
wiley +1 more source
Geometric multi‐bit patterning based on dynamic wetting and dewetting phenomena creates roulette‐like Physical Unclonable Function (PUF) labels with stochastic yet deterministic properties. This method leverages the solutal‐Marangoni effect for high randomness while achieving deterministic multinary patterns through polygonal confinement of binary ...
Yeongin Cho+8 more
wiley +1 more source
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability.
Canling Wang+8 more
doaj +1 more source
How Hackers Try to Trick You [PDF]
As cyber-attacks continue to become more sophisticated, University of Maine System (UMS) employees need to be vigilant and aware of the multitude of ways hackers can gain access to sensitive information.
UMS Information Security+1 more
core +1 more source
This study demonstrates the use of a low‐cost 3D printing technique to prepare a large‐area PVDF‐FAPbI3 composite dielectric film for flexible TENG application. The δ→α phase transformation of the FAPbI3 nanofillers has significantly improved the β‐phase content, morphology, and dielectric properties of the PVDF film.
Nurfatin Hafizah Zain Karimy+7 more
wiley +1 more source
The NPFIT strategy for information security of care record service [PDF]
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core
This presentation provides insights into information security by UZH's Chief Information Security Officer, Oli Schmid.
openaire +2 more sources
Structured, Shaped, or Printed Single‐Atom Catalysts and Their Applications
This paper reviews the design and use of structured single‐atom catalysts, which integrate porous architectures with the exceptional reactivity of isolated catalytic sites. It explores fabrication strategies, advanced characterization methods, and support materials that enhance thermal stability, mechanical robustness, and operational efficiency of ...
Jiachengjun Luo+4 more
wiley +1 more source