Network Security Prediction of Industrial Control Based on Projection Equalization Optimization Algorithm. [PDF]
Li G +5 more
europepmc +1 more source
A nanostructured, naturally flame‐retardant, and non‐toxic inorganic composite is introduced, which is laterally associated with silica nanoparticles to induce the restacking of the LDH lamella structure, thereby serving as an efficient thermal insulator.
Gayani Pathiraja +7 more
wiley +1 more source
The Intersection of Machine Learning and Wireless Sensor Network Security for Cyber-Attack Detection: A Detailed Analysis. [PDF]
Delwar TS +7 more
europepmc +1 more source
This study presents the rational design and synthesis of a highly luminescent polymeric nanocomposite. Initially, highly fluorescent carbon quantum dots (CQDs) are synthesized via a facile hydrothermal method using citric acid and β‐alanine as precursors, followed by rigorous purification through centrifugation and filtration.
Yunus Emre Toprak +2 more
wiley +1 more source
Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques. [PDF]
Chinnasamy P +5 more
europepmc +1 more source
Water‐Stable Paper‐Based Laser‐Induced Graphene With Asymmetric Water Adhesion and Wettability
Paper‐based electronics are attractive for sustainable and disposable devices, but often fail in wet environments. By introducing Parafilm into cellulose paper combined with laser conversion, two graphene surfaces with different water interactions are created.
Lingyin Meng +3 more
wiley +1 more source
Research on a Critical Link Discovery Method for Network Security Situational Awareness. [PDF]
Yang G, Zhang Y, Lu Y, Xie Y, Yu J.
europepmc +1 more source
Nanozymes (NZs) have emerged as versatile artificial enzymes with tunable catalytic properties driven by atomic coordination, defect engineering, and surface chemistry. This review presents a bio–nano interface framework linking synthesis strategies, structural design, and catalytic behavior within complex biological microenvironments.
Karen Guadalupe Quintero‐Garrido +6 more
wiley +1 more source
Metaheuristics based dimensionality reduction with deep learning driven false data injection attack detection for enhanced network security. [PDF]
Vaiyapuri T +5 more
europepmc +1 more source
Network Security Technology of Supply Chain Management Based on Internet of Things and Big Data.
Lin X.
europepmc +1 more source

