Results 51 to 60 of about 834,303 (333)
Ultralight 3D nanofibrous aerogels embedded with metal‐organic frameworks effectively capture and neutralize toxic gases and organophosphonates. Incorporating mesoporous UiO‐66‐NH2 and HKUST‐1 into PAN/PVP fibers enables high MOF loading while maintaining mechanical strength and structural stability.
Mai O. Abdelmigeed +6 more
wiley +1 more source
Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments
The ease of programmability in Software-Defined Networking (SDN) makes it a great platform implementation of various initiatives that involve application deployment, dynamic topology changes, and decentralized network management in a multi-tenant data ...
Sandeep Pisharody +4 more
semanticscholar +1 more source
Synthetic Nanobiology Actuated Lipometabolic Cell Factory for Autologous Tumor Immunotherapy
FA plays a crucial role in the interaction between tumor cells and the tumor microenvironment, especially for the immune response. A biocatalytic immunoenhancement strategy is developed to boost antitumor immunity by FA metabolic orientation to ceramide. Through the design of this delicate catalytic immunoenhancement strategy, the synthetic nanobiology
Shoujie Zhao +8 more
wiley +1 more source
Microscale hydrogels (microgels) feature improved mass transport characteristics supportive of fast actuation and chemical tunability amenable to programmed stimuli response. A unique soft actuator architecture is realized by encapsulating microgels in soft microcirculatory systems which enable the convenient delivery of liquid stimuli for powering and
Nengjian Huang +2 more
wiley +1 more source
In the face of increasingly sophisticated and dynamic cyber threats, policy-based cybersecurity deployment has emerged as a critical strategy for securing modern, complex network infrastructures.
Spyridon Evangelatos +8 more
doaj +1 more source
Interval-Valued Neutrosophic Sets-Based IVNS-RAM Method for Enhanced Security Evaluation in Computer Networks [PDF]
Computer network security (CNS) evaluation is the process of analyzing and assessing the security of a network system. Its goal is to identify potential security vulnerabilities and threats, ensuring the confidentiality, integrity, and availability of ...
Lei Yang, Junyan Niu, Jiangfeng Li
doaj +1 more source
Combination Model of Heterogeneous Data for Security Measurement [PDF]
Measuring security is a core step for guaranteeing security of network and information systems. Due to massiveness and heterogeneity of measurement data, it is difficult to classify and combine them on demand.
Xiuze Dong +4 more
doaj +3 more sources
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak +14 more
wiley +1 more source
Reactive Power Optimization of a Distribution Network Based on Graph Security Reinforcement Learning
With the increasing integration of renewable energy, the secure operation of distribution networks faces significant challenges, such as voltage limit violations and increased power losses.
Xu Zhang +7 more
doaj +1 more source
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications
In this paper we propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a firewall for a robotic system.
Sean Rivera +4 more
semanticscholar +1 more source

