Results 81 to 90 of about 3,238,646 (347)
Information Security Methodology, Replication Studies and Information Security Education [PDF]
Steffen Wendzel+6 more
openaire +6 more sources
Using supramolecular monomers, various hydrogel culture systems were formulated to culture protoplasts; including 2D, 2.5D, and 3D hydrogels. Depending on the culture platform, bioactive functionalization led to protoplast enlargement (2D and 2.5D) or plasmolysis (3D). This work shows the potential to modularly engineer synthetic platforms for cellular
Maritza M. Rovers+3 more
wiley +1 more source
The Federal Information Security Management Act of 2002: A Potemkin Village [PDF]
Due to the daunting possibilities of cyberwarfare, and the ease with which cyberattacks may be conducted, the United Nations has warned that the next world war could be initiated through worldwide cyberattacks between countries.
White, Daniel M.
core +1 more source
This study develops a tissue‐engineered model of the atherosclerotic cap using human mesenchymal stromal cells (MSCs). After 2 weeks of culture to produce a collagenous matrix, a mineralizing medium induces microcalcifications over 4 weeks. These constructs, imaged with second harmonic generation microscopy, lead to reduced ultimate stress at rupture ...
Imke L. Jansen+4 more
wiley +1 more source
Detection of Electric Network Frequency in Audio Using Multi-HCNet
With the increasing application of electrical network frequency (ENF) in forensic audio and video analysis, ENF signal detection has emerged as a critical technology.
Yujin Li+6 more
doaj +1 more source
Quantum Private Query Protocol Based on Two Non-Orthogonal States
We propose a loss tolerant quantum private query (QPQ) protocol based on two non-orthogonal states and unambiguous state discrimination (USD) measurement.
Yan Chang+5 more
doaj +1 more source
3D‐Printed Architected Material for the Generation of Foam‐Based Protective Equipment
This study investigates 3D‐printed architected structures as alternatives to traditional foams in protective gear. It focuses on customizing impact strength and damping through design and manufacturing integration. Testing shows these structures outperform conventional foams, offering enhanced customizability, lower weight, and tunable performance ...
Ali Zolfagharian+5 more
wiley +1 more source
The Darknet marketplace, operating on anonymous communication techniques, has become a central hub for illicit trade, enabling elusive vendors to engage in illegal activities.
Xuan Zhang+6 more
doaj +1 more source
An Overview of Economic Approaches to Information Security Management [PDF]
The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security.
Su, X.
core +2 more sources
This study explores the effects of pixel size and spacing when fabricating electroluminescent (EL) multipixel displays. COMSOL simulations identify the impact of pixel dimensions and spacing on electric field distribution and lighting efficiency. Flexible, high‐resolution EL pixel arrays are reverse offset printed, achieving a 96% reduction in pixel ...
Huanghao Dai+3 more
wiley +1 more source