Results 201 to 210 of about 3,475,621 (326)
Information security education: a thematic trend analysis. [PDF]
Rodríguez-Correa PA +6 more
europepmc +1 more source
An Investigation of Employees' Intention to Comply with Information Security System-A Mixed Approach Based on Regression Analysis and fsQCA. [PDF]
Li W, Liu R, Sun L, Guo Z, Gao J.
europepmc +1 more source
High‐entropy perovskite nanofibers serve as robust and active bifunctional air electrodes in reversible protonic ceramic electrochemical cells. Their compositional complexity stabilizes the lattice, enriches oxygen vacancies, and accelerates surface exchange.
Hyeonggeun Kim +4 more
wiley +1 more source
Polarization-selective unidirectional and bidirectional diffractive neural networks for information security and sharing. [PDF]
Guo Z +9 more
europepmc +1 more source
Legal Management of Network Information Security Based on Embedded Real-Time Task Processing. [PDF]
Bai H.
europepmc +1 more source
The Mosaic Theory, National Security, and the Freedom of Information Act
David E. Pozen
openalex +1 more source
Vacuum‐based deposition is promising for perovskite solar cells to be successfully commercialized. However, co‐evaporation, the most common vapor phase deposition technique, suffers from very low deposition rates. In this work, we reveal that high deposition rates can lead to carbon flakes depositing into the perovskite absorber layers due to material ...
Thomas Feeney +13 more
wiley +1 more source
Applying the defense model to strengthen information security with artificial intelligence in computer networks of the financial services sector. [PDF]
Karn AL +7 more
europepmc +1 more source

