Results 171 to 180 of about 3,500,013 (329)
Privacy Law Protection Based on the Information Security Assurance Algorithm. [PDF]
Wang Z, Yue Q.
europepmc +1 more source
Information security. 2. Information security in broadcasting.
openaire +2 more sources
Efficient Charge Transport in Zero‐Dimensional Perovskite for Ultrahigh‐Sensitivity X‐Ray Detection
A novel mono‐octahedral 0D Bi‐based Dpy3Bi2I12 perovskite strengthens the internal hydrogen bonds and forms a quasi‐2D lattice, exhibits exceptional charge transport and mobility, achieving high X‐ray sensitivity and ultralow‐dose imaging, and setting a new benchmark for 0D detector performance.
Xin Song +16 more
wiley +1 more source
Exploring the Role of Nursing Ethics in Shaping Information Security Culture: A Normative and Care Ethics Perspective. [PDF]
Mikuletič S, Vrhovec S, Žvanut B.
europepmc +1 more source
Countering fake information as a guarantee of state information security. [PDF]
Svintsytskyi AV +5 more
europepmc +1 more source
Information security. 4. Information security in network.
openaire +2 more sources
Spin Defects in Hexagonal Boron Nitride as 2D Strain Sensors
We demonstrate that boron‐vacancy (VB${\rm V}_{\rm B}$) centers in hexagonal boron nitride (hBN) enable quantitative strain sensing with sub‐micrometer resolution. Using this approach under continuously tunable in‐plane stress, we precisely quantify strain‐induced shifts of the E2g${\rm E}_{2{\rm g}}$ Raman mode in multilayer hBN, establishing VB${\rm ...
Zhao Mu +7 more
wiley +1 more source
Exploring information security compliant behaviors in healthcare Knowledge Process Outsourcing (KPOs). [PDF]
Mahipala C, Perera P.
europepmc +1 more source

