Results 121 to 130 of about 1,786,070 (326)
To address the vulnerability description mapping (VDM) task, current approaches employ deep learning and large language models (LLMs) through prompt engineering, framing VDM as multi-class classification, multi-label classification, and text generation ...
Fengrui Yu, Yanhui Du
doaj +1 more source
Light‐Responsive Enzyme‐Loaded Nanoparticles for Tunable Adhesion and Mechanical Wound Contraction
This study presents a photoactivatable enzyme‐loaded mesoporous nanoparticle system (MPDA_PaTy) that enables light‐triggered tunable tissue adhesion and facilitates mechanical wound contraction. Controlled enzymatic crosslinking at tissue or hydrogel interfaces allows on‐demand adhesion.
Junghyeon Ko +10 more
wiley +1 more source
A Robust Stackelberg Game for Cyber-Security Investment in Networked Control Systems [PDF]
Pratishtha Shukla +3 more
openalex +1 more source
This study explores the benefits of metasurfaces made from functional materials, highlighting their ability to be adapted and improved for various high‐frequency applications, including communications and sensing. It first demonstrates the potential of these functional material‐based metasurfaces to advance the field of sub‐THz perceptive networks ...
Yat‐Sing To +5 more
wiley +1 more source
Enhancing Security of Networks Through a Novel Biometric Signature Based Approach [PDF]
Sherin Zafar
openalex +1 more source
Ice Lithography: Recent Progress Opens a New Frontier of Opportunities
This review focuses on recent advancements in ice lithography, including breakthroughs in compatible precursors and substrates, processes and applications, hardware, and digital methods. Moreover, it offers a roadmap to uncover innovation opportunities for ice lithography in fields such as biological, nanoengineering and microsystems, biophysics and ...
Bingdong Chang +9 more
wiley +1 more source
SPAN security policies and guidelines [PDF]
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure.
Green, James L., Sisson, Patricia L.
core +1 more source
Strain‐Activated Photo‐Dehalogenation Unlocks Low‐Energy One and Two‐Photon 3D Microfabrication
5,14‐NMI‐Cz acts, conversely to its 7,10‐NMI‐Cz(7,10‐'dibromo‐2‐(2,6‐diisopropylphenyl)‐1H‐benzo[lmn]carbazolo[9,1‐bc][2,8]phenanthroline‐1,3(2H)‐dione) counterpart, as modular photoinitiator with panchromatic photoactivity, featuring a weak C–Br bond from geometric strain for efficient Type I & II initiation. These studies demonstrate applicability of
Kacper Piskorz +10 more
wiley +1 more source
Thermoelectric temperature sensors are developed that directly measure heat changes during optical‐based neural stimulation with millisecond precision. The sensors reveal the temperature windows for safe reversible neural modulation: 1.4–4.5 °C enables reversible neural inhibition, while temperatures above 6.1 °C cause permanent thermal damage.
Junhee Lee +9 more
wiley +1 more source

