Results 101 to 110 of about 462,135 (294)

Experimenter's Freedom in Bell's Theorem and Quantum Cryptography

open access: yes, 2005
Bell's theorem states that no local realistic explanation of quantum mechanical predictions is possible, in which the experimenter has a freedom to choose between different measurement settings.
I. Csiszár   +6 more
core   +1 more source

Deciphering Intricacies in Directional CO2 Conversion From Electrolysis to CO2 Batteries

open access: yesAdvanced Energy Materials, EarlyView.
This review will delve into the inherent connections and distinctions of CO2‐directed conversion in ECO2RR and CO2 batteries, in terms of product types, catalyst selection, catalytic mechanisms, and electrochemical performances, while proposing a benchmarking framework for the evaluation of CO2 batteries and innovative CO2 battery configurations for ...
Changfan Xu   +5 more
wiley   +1 more source

Zero-Error Attacks and Detection Statistics in the Coherent One-Way Protocol for Quantum Cryptography

open access: yes, 2006
This is a study of the security of the Coherent One-Way (COW) protocol for quantum cryptography, proposed recently as a simple and fast experimental scheme.
Branciard, Cyril   +3 more
core  

Farmers’ Protests in Germany: Media Coverage and Types of Bias

open access: yesAgribusiness, EarlyView.
ABSTRACT The German farmers’ protests of 2024 sparked widespread media coverage and public debate. Yet, media coverage was not always positive, reflecting the media's attention‐seeking and selective focus. Occurrences of farmers blocking media outlets reflected distrust in how their concerns were portrayed.
Felix Schlichte, Doris Läpple
wiley   +1 more source

Finding Software Supply Chain Attack Paths with Logical Attack Graphs

open access: yes
18th International Symposium on Foundations and Practice of Security (FPS 2025), Nov 2025, Brest ...
Soeiro, Luıs   +2 more
openaire   +2 more sources

SRLR: Symbolic Regression-Based Logic Recovery to Counter Programmable Logic Controller Attacks

open access: yesIEEE Transactions on Information Forensics and Security
Programmable Logic Controllers (PLCs) are critical components in Industrial Control Systems (ICSs). Their potential exposure to external world makes them susceptible to cyber-attacks. Existing detection methods against controller logic attacks use either specification-based or learnt models.
Hao Zhou   +3 more
openaire   +2 more sources

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Automation of Surgical Workflow Recognition: Unveiling the Surgical Instrument Kinematics that Underly Robot‐Assisted Prostatectomy Procedures

open access: yesAdvanced Intelligent Discovery, EarlyView.
Automated procedural analysis is recognized as one of the major game changers for robotic surgery. Meaning digital analysis needs to replace the manual assessments that set todays standard. Mechanical robotic‐instrument tracking enables the derivation of quantitative kinematic metrics that support behavior‐based workflow segmentation into distinct ...
Kateryna Pirkovets   +4 more
wiley   +1 more source

A semantic approach to reachability matrix computation [PDF]

open access: yes, 2015
The Cyber Security is a crucial aspect of networks management. The Reachability Matrix computation is one of the main challenge in this field. This paper presents an intelligent solution in order to address the Reachability Matrix computational ...
CILIA, NICOLE DALIA   +2 more
core  

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy