Results 61 to 70 of about 7,184 (199)
A Forensically Sound Adversary Model for Mobile Devices
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and
Choo, Kim-Kwang Raymond +2 more
core +2 more sources
Reusing organic waste materials, such as animal manure, as soil amendments reduces water and fertiliser demand, contributing to achieving the Sustainable Development Goals. However, organic wastes may contain contaminants of emerging concern (CECs), posing potential ecosystem and human health risks. Despite the importance of this issue, there is a lack
Felicity C. T. Elder +7 more
wiley +1 more source
Cybersecurity in Onion Routing Environments: Strategies to Thwart Cyber Threats
Onion routing networks, or darknets, enable anonymous communication, protecting user privacy and attracting cybercriminals. This paper analyzes cybercrime in these networks, including drug trafficking, fraud, and hacking.
Karwan Mustafa Kareem
doaj +1 more source
Compromising Tor Anonymity Exploiting P2P Information Leakage [PDF]
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to
Abdelberri, Chaabane +6 more
core +5 more sources
Schematic diagram of the single and dual RPA‐CRISPR/Cas12a/13a diagnostic assays for the detection of Pantoea stewartii subsp. stewartii and Maize dwarf mosaic virus. The validated assays provide a useful and sensitive molecular tool for detecting two quarantine pathogens of maize within a minimal resource framework suitable for fast‐tracking the ...
Qian Tian +6 more
wiley +1 more source
Ashwagandha: Is It Safe? Part 2: A Preclinical Evidence Review
ABSTRACT The preclinical evidence for the safety of ashwagandha (Withania somnifera (L.) Dunal, AS) is reviewed, and its preparations (extracts) and constituents, from the general toxicity in animal models to in vitro and cell culture studies, which may elucidate mechanisms of action and explain clinical case reports.
Elizabeth M. Williamson, Thomas Brendler
wiley +1 more source
A two‐step authentication framework for Mobile ad hoc networks [PDF]
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C. +2 more
core
ABSTRACT Alzheimer's disease (AD) is a progressive neurodegenerative condition characterized by a preclinical stage that typically lasts for decades. Early on during this time, microglia react to pathological changes and become protective and even transiently delay neurodegeneration.
Sara Merlo +3 more
wiley +1 more source
Post-Quantum Migration of the Tor Application
The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt ...
Denis Berger +2 more
doaj +1 more source
Polyion complex micelles composed of blends of ABA and AB block copolymers can form coacervates with a hexagonally packed cylinder nanostructure after heating. The resulting coacervates can release the micelles under physiological conditions in a zero‐order kinetics, possessing cargo proteins.
Takumi Egashira +9 more
wiley +1 more source

