Necessity and Importance of Developing AI in Anesthesia from the Perspective of Clinical Safety and Information Security. [PDF]
Song B, Zhou M, Zhu J.
europepmc +1 more source
Data Security Framework for Electric Company Mobile Apps to Prevent Information Leakage
Yuxiang Cai, Fei Wu
openalex +1 more source
In operando neutron diffraction reveals the real‐time structural evolution of O3‐type NaxNi1/3Mn1/3Fe1/3O2 in commercial sodium‐ion batteries that is coupled with electrochemical and tomography data. The study establishes a direct link between current‐dependent phase transitions, lattice kinetics, and electrochemical behavior, offering mechanistic ...
B. D. K. K. Thilakarathna +4 more
wiley +1 more source
Blockchain consensus algorithm for supply chain information security sharing based on convolutional neural networks. [PDF]
Cai L, Liu A, Yan Y.
europepmc +1 more source
Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors. [PDF]
Sari PK +4 more
europepmc +1 more source
The Pedagogical Approach To The Development Of Information Security Culture
Alevtina V. Vilkova +2 more
openalex +1 more source
Biosupercapacitors for Human‐Powered Electronics
Biosupercapacitors are emerging as biocompatible and integrative energy systems for next‐generation bioelectronics, offering rapid charge–discharge performance and mechanical adaptability. This review systematically categorizes their applications from external to organ‐level systems and highlights their multifunctional roles in sensing, actuation, and ...
Suhyeon Kim +7 more
wiley +1 more source
Influencing factors of information security behavior among college students based on protection motivation theory: evidence from China. [PDF]
Han M, Zhao H, Ma X, Shi R.
europepmc +1 more source
The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention. [PDF]
Jiang R, Zhang J.
europepmc +1 more source
A qualitative investigation of bank employee experiences of information security and phishing
Dan Conway +5 more
openalex +1 more source

