Results 71 to 80 of about 130,608 (266)
Ensuring Information Security and Factographic Systems
This article is about methods of information security. These methods are a part of the automated tools of ensuring the information security. It is offered to use a factographic information retrieval. The results are protected with patents.
Sergey Dmitrievich Kulik
doaj
An idea of designing novel sensors is proposed by creating appropriate Schottky barriers and vacancies between isomorphous Core‐CuOii/ Shell‐CuOi secondary microspheres and enhancing catalytic and spill‐over effects, and electronegativity via spontaneous biphasic separation, self‐assembly, and trace‐Ni‐doping.
Bala Ismail Adamu +8 more
wiley +1 more source
Effective Formation of Factographic Data for Automated Means of Information Security
This article is about special methods of information security. These methods are a part of the automated tools of ensuring the information security. It is offered to use a special factographic information retrieval.
Sergey Dmitrievich Kulik +3 more
doaj
Organization of response to information security incidents
Objective. Development of practical recommendations for creating an effective information security incident response system. Method. The article includes an analysis of existing methods and tools for detecting and analyzing information security incidents,
D. O. Trofimov +2 more
doaj +1 more source
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
A lack of standard approaches for testing and reporting the performance of metal halide perovskites and organic semiconductor radiation detectors has resulted in inconsistent interpretation of performance parameters, impeding progress in the field. This Perspective recommends key metrics and experimental details, which are suggested for reporting in ...
Jessie A. Posar +8 more
wiley +1 more source
Register transfer level hardware design information flow modeling and security verification method
Information flow analysis can effectively model the security behavior and security properties of hardware design. However, the existing gate level information flow analysis methods cannot deal with large-scale designs due to computing power and ...
QIN Maoyuan +4 more
doaj +1 more source
Review article presents essential information on DNA databases, forensic genomics for human identification and suspect characteristics. Author reports the essential information on the topic of forensic DNA databases and data processing. DNA databases are
M. V. Sprindzuk +2 more
doaj +1 more source
Computational tool for web systems information security
Actualmente, la seguridad de la información se ha convertido en uno de los mayores desafíos para la mayoría de las organizaciones; en un proceso de gestión de riesgo se cubre todo lo que la información requiere para ser protegida. La ISO 17799 ofrece lo que las organizaciones necesitan con el fin de una mejor gestión de la seguridad de la información ...
Edward Zárate Carlos +2 more
openaire +1 more source
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana +2 more
wiley +1 more source

