Results 241 to 250 of about 14,130,174 (398)
Neural variability fingerprint predicts individuals' information security violation intentions. [PDF]
Duan Q, Xu Z, Hu Q, Luo S.
europepmc +1 more source
Attack Modeling for Information Security and Survivability [PDF]
Andrew P. Moore+2 more
openalex +1 more source
This study investigates optoelectronic PUFs that improve on traditional optical and electrical PUFs. The absorber materials are randomly coated through spray coating, ligand exchange, and dynamic spin coating. Incident light generates wavelength‐dependent binary multikey and enhances security ternary keys, approaching near‐ideal inter‐ and intra ...
Hanseok Seo+6 more
wiley +1 more source
Cyberbiosecurity: Advancements in DNA-based information security. [PDF]
Liu T, Zhou S, Wang T, Teng Y.
europepmc +1 more source
Bioinspired Perovskite Nanocrystals-Integrated Photonic Crystal Microsphere Arrays for Information Security. [PDF]
Bian F+6 more
europepmc +1 more source
Rapid Diagnostics of Reconfigurable Intelligent Surfaces Using Space‐Time‐Coding Modulation
A fast reconfigurable‐intelligent‐surface (RIS) diagnostics method is proposed based on spatio‐temporal modulation with orthogonal codes. Theoretical analysis demonstrates a clear distinction in code channel power between normal and faulty elements. Simulations validate its feasibility under high fault ratios and varying receiving angles.
Yi Ning Zheng+7 more
wiley +1 more source
Information Aggregation, Security Design, and Currency Swaps [PDF]
Bhagwan Chowdhry+2 more
openalex +2 more sources
A systematic mapping study on gamification within information security awareness programs. [PDF]
Pahlavanpour O, Gao S.
europepmc +1 more source