Results 161 to 170 of about 3,500,013 (329)
Understanding phishing discussions on stack overflow and information security stack exchange. [PDF]
Althobaiti K, Tahaei M.
europepmc +1 more source
This study develops a novel atomic engineering strategy to fine‐tune the spin state of α‐Fe2O3 catalysts toward a medium‐spin state, thereby modulating peroxymonosulfate activation and selectively yielding surface‐bound radicals. Compared with free radicals, surface‐bound radicals exhibit moderated oxidation potential, extended lifespan, surface ...
Shuyu Wang +7 more
wiley +1 more source
Advances and Future Directions in Information Security and Data Privacy. [PDF]
Alishahi M.
europepmc +1 more source
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions. [PDF]
Kotak J +4 more
europepmc +1 more source
Economic Aspects of Analysis of Occurrence of Incidential Events on the Scope of Security of Information in a Production Enterprise [PDF]
Justyna Żywiołek
openalex +1 more source
Bioprosthetic aortic valves have revolutionized the treatment of aortic stenosis, but their durability is limited by structural valve deterioration (SVD). This review focuses on the pericardial tissue at the heart of these valves, examining how its mechanical properties and calcification drive fatigue and failure.
Gabriele Greco +7 more
wiley +1 more source
Information security behavior of healthcare professionals in the Sultanate of Oman based on the PMT model. [PDF]
Al Toobi A, Al Suqri M.
europepmc +1 more source

