Results 81 to 90 of about 130,608 (266)
Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems [PDF]
Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data ...
Juan Manuel Cueva Lovelle +4 more
doaj +1 more source
Software Robots and Information Security
This article is about special methods of information security. These methods are a part of the tools of ensuring the information security. In this paper the problem of threats and protection against software robots discussed.
Sergey Dmitrievich Kulik +1 more
doaj
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai +8 more
wiley +1 more source
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner +9 more
wiley +1 more source
Synchrotron Radiation for Quantum Technology
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader +10 more
wiley +1 more source
The Method of Information Value Estimation Using Fuzzy Logic Tools
The paper contains the description of the method of information objects value estimation when analyzing the information security risk using fuzzy logic tools.
M. B. Guzairov +2 more
doaj
Conceptual foundations of information support for enterprises in the economic security sphere
The conceptual foundations of information support of enterprises’ activities in the economic security sphere, which is a system of interrelated principles, methods, and tools aimed at creating, processing, and analyzing information necessary for making ...
S. N. Petrenko +2 more
doaj +1 more source
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida +16 more
wiley +1 more source
The chemical composition and band alignment are systematically investigated at the TiO2/InP heterointerface. Thin TiO2 films are deposited by ALD on atomically ordered, P‐terminated p‐InP(100). By combining UPS, XPS, and ab initio molecular dynamics, the atomistic structure and electronic alignment are revealed.
Mohammad Amin Zare Pour +11 more
wiley +1 more source
By integrating machine learning into flux‐regulated crystallization (FRC), accurate prediction of solvent evaporation rates in real time, improving crystallization control and reducing crystal growth variability by over threefold, is achieved. This enhances the reproducibility and quality of perovskite single crystals, leading to reproducible ...
Tatiane Pretto +8 more
wiley +1 more source

