Information Security and Cryptography. Information Security Technology and Services in Network.
Kiyoshi Yamanaka, Ikuro Oyaizu
openalex +2 more sources
Dynamic security margin estimation using artificial neural networks [PDF]
A. Sittithumwat, Kevin Tomsovic
openalex +1 more source
Supramolecular Liquid Crystal Elastomer Adhesives: Role of Internal Damping and Hydrogen Bonding
The adhesion strength can be significantly enhanced through the molecular design of supramolecular liquid crystal elastomers (LCEs) that combine high internal damping from mesogen reorientation with abundant hydrogen‐bonding moieties. Solvent vapor annealing enables reversible, non‐thermal control of adhesion, offering potential for heat‐sensitive ...
Subi Choi, Suk‐kyun Ahn
wiley +1 more source
Enhancing IoT Network Security: Unveiling the Power of Self-Supervised Learning against DDoS Attacks. [PDF]
Almaraz-Rivera JG+2 more
europepmc +1 more source
Toward the 3rd Generation of Smart Farming: Materials, Devices, and Systems for E‐Plant Technologies
This review explores the latest developments in e‐plant technologies, which are revolutionizing smart farming by enabling real‐time monitoring of plant and environmental conditions. It covers the design, applications, and systems of e‐plant devices, detailing how they integrate data analytics to optimize agricultural practices, enhance crop yields, and
Daegun Kim+5 more
wiley +1 more source
A Multimodal Network Security Framework for Healthcare Based on Deep Learning. [PDF]
Chen QQ+8 more
europepmc +1 more source
Security architectures for network clients [PDF]
Victoria Skoularidou, Diomidis Spinellis
openalex +1 more source
Locking Metastable Topological Domains in Nematic Liquid Crystal Pi Cells
Selective photopolymerization in the presence of a controlled voltage defines permanent director walls that lock‐in metastable bend and twist configurations within nematic liquid crystal Pi cells. Q‐tensor simulations corroborate the experiments, demonstrating the topological state stabilization.
Adithya Pradeep+7 more
wiley +1 more source
To secure the massive amounts of secret messages, the integrity and confidentiality challenges must be addressed. Pressing challenges in the context of a steganography system include security, imperceptibility, and capacity issues.
Ali Salem Ali+2 more
doaj +1 more source
Development of Network Security Based on the Neural Network PSD Algorithm. [PDF]
Li J, Ji S, Jiang Y.
europepmc +1 more source