Results 121 to 130 of about 1,717,630 (292)
Mobility helps security in ad hoc networks [PDF]
Srđjan Čapkun +2 more
openalex +2 more sources
Privacy-preserving pathological data sharing among multiple remote parties
The sharing of pathological data is highly important in various applications, such as remote diagnosis, graded diagnosis, illness treatment, and specialist system development.
Wei Wu +9 more
doaj +1 more source
Satellite Network Security Routing Technology Based on Deep Learning and Trust Management. [PDF]
Liu Z, Rong J, Jiang Y, Zhang L.
europepmc +1 more source
This work presents a soft microelectrode array based on vertically aligned carbon nanotube (CNT) forests, combining high conductivity with mechanical softness. A densification process and air‐pressure‐assisted flexibilization improve structural integrity, ensuring stable insertion and reduced inflammation.
Hyeonhee Roh +8 more
wiley +1 more source
Information security. 4. Information security in network.
Tsutomu Matsumoto
openalex +2 more sources
Survey of Technology in Network Security Situation Awareness. [PDF]
Zhang J, Feng H, Liu B, Zhao D.
europepmc +1 more source
Biosupercapacitors for Human‐Powered Electronics
Biosupercapacitors are emerging as biocompatible and integrative energy systems for next‐generation bioelectronics, offering rapid charge–discharge performance and mechanical adaptability. This review systematically categorizes their applications from external to organ‐level systems and highlights their multifunctional roles in sensing, actuation, and ...
Suhyeon Kim +7 more
wiley +1 more source
Summary of Security Technologies for Information Network Systems
Kinko Yamamoto
openalex +2 more sources
The Implementation of Policy Management Tool Based on Network Security Policy Information Model [PDF]
Geon Lyang Kim +2 more
openalex +1 more source
Awareness of network security and customer value - The company and customer perspective. [PDF]
Krawczyk-Sokołowska I, Caputa W.
europepmc +1 more source

