Results 161 to 170 of about 14,354,866 (342)
Privacy Law Protection Based on the Information Security Assurance Algorithm. [PDF]
Wang Z, Yue Q.
europepmc +1 more source
National Aeronautics and Space Administration's (NASA) automated information security handbook
Edward Roback
openalex +1 more source
Information Security: Process Evaluation and Product Evaluation [PDF]
Mariki M. Eloff, Sebastiaan H. von Solms
openalex +1 more source
The pre‐internalization phase of endocytosis remains poorly characterized at single‐cell levels. Single‐cell pre‐internalization mechanics are investigated using advanced robotic techniques. Cancer cells exhibit biphasic adhesion – rapid initial binding followed by reinforcement – while fibroblasts show gradual engagement.
Houari Bettahar +6 more
wiley +1 more source
Risk management in digitalized educational environments: Teachers' information security awareness levels. [PDF]
Sapanca HF, Kanbul S.
europepmc +1 more source
Rapid Diagnostics of Reconfigurable Intelligent Surfaces Using Space‐Time‐Coding Modulation
A fast reconfigurable‐intelligent‐surface (RIS) diagnostics method is proposed based on spatio‐temporal modulation with orthogonal codes. Theoretical analysis demonstrates a clear distinction in code channel power between normal and faulty elements. Simulations validate its feasibility under high fault ratios and varying receiving angles.
Yi Ning Zheng +7 more
wiley +1 more source
Countering fake information as a guarantee of state information security. [PDF]
Svintsytskyi AV +5 more
europepmc +1 more source
Establishing an Information Systems Security Organization (ISSO)
Gerald L. Kovacich
openalex +1 more source
Policies for Construction of Information Systems’ Security Guidelines [PDF]
Mikko Siponen
openalex +1 more source
Toward a Unified Model of Information Security Policy Compliance
Gregory Moody, M. Siponen, Seppo Pahnila
semanticscholar +1 more source

