Results 131 to 140 of about 3,475,621 (326)
Algorithms and methods of data clustering in the analysis of information security event logs
Diana N. Sidorova +2 more
openalex +2 more sources
A 3D bone scaffold with osteogenic properties and capable of hardening in vivo is developed. The scaffold is implanted in a ductile state, and a phase transformation of the ceramic induces the stiffening and strengthening of the scaffold in vivo. Abstract Calcium phosphate 3D printing has revolutionized customized bone grafting.
Miguel Mateu‐Sanz +7 more
wiley +1 more source
FEATURES OF THE CURRENT STATE OF LEGAL REGULATION OF INFORMATION SECURITY IN COMMERCIAL LITIGATION
L V Sokurenko
openalex +1 more source
This study presents the BioCLEAR system, a highly transparent and conductive neural electrode array composed of silver nanowires (AgNWs) and doped PEDOT:PSS, enabling neural recordings with minimal optical artifacts. When integrated with a GRIN lens, this cost‐effective neural implant allows simultaneous electrophysiological recording and GCaMP6‐based ...
Dongjun Han +17 more
wiley +1 more source
Dealing with security requirements during the development of information systems [PDF]
Lawrence Chung
openalex +1 more source
While host structures are known to enhance the reversibility and safety of lithium metal deposition, their additional volume and weight often decrease the battery's energy density and specific energy. By combining a lightweight and porous scaffold of electrospun polymer with a thinner separator, this article demonstrates a simultaneous improvement of ...
Lennart Wichmann +6 more
wiley +1 more source
The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions. [PDF]
Chen L, Xie Z, Zhen J, Dong K.
europepmc +1 more source
Quantitative Method for Security Situation of the Power Information Network Based on the Evolutionary Neural Network [PDF]
Quande Yuan +4 more
openalex +1 more source
Photoswitching Conduction in Framework Materials
This mini‐review summarizes recent advances in state‐of‐the‐art proton and electron conduction in framework materials that can be remotely and reversibly switched on and off by light. It discusses the various photoswitching conduction mechanisms and the strategies employed to enhance photoswitched conductivity.
Helmy Pacheco Hernandez +4 more
wiley +1 more source
A Fast Search Method for 3-Share Second-Order Masking Schemes for Lightweight S-Boxes
Masking schemes are widely adopted strategies for countering side-channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in hardware platforms. The minimum number of
Yanhong Fan +3 more
doaj +1 more source

