Results 61 to 70 of about 7,184 (199)

A Forensically Sound Adversary Model for Mobile Devices

open access: yes, 2015
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and
Choo, Kim-Kwang Raymond   +2 more
core   +2 more sources

An integrated social and natural sciences case study for the reuse of organic wastes as soil amendments

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Reusing organic waste materials, such as animal manure, as soil amendments reduces water and fertiliser demand, contributing to achieving the Sustainable Development Goals. However, organic wastes may contain contaminants of emerging concern (CECs), posing potential ecosystem and human health risks. Despite the importance of this issue, there is a lack
Felicity C. T. Elder   +7 more
wiley   +1 more source

Cybersecurity in Onion Routing Environments: Strategies to Thwart Cyber Threats

open access: yesJournal of High-Frequency Communication Technologies
Onion routing networks, or darknets, enable anonymous communication, protecting user privacy and attracting cybercriminals. This paper analyzes cybercrime in these networks, including drug trafficking, fraud, and hacking.
Karwan Mustafa Kareem
doaj   +1 more source

Compromising Tor Anonymity Exploiting P2P Information Leakage [PDF]

open access: yes, 2010
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to
Abdelberri, Chaabane   +6 more
core   +5 more sources

Single and dual RPA‐CRISPR/Cas assays for point‐of‐need detection of Stewart's wilt pathogen (Pantoea stewartii subsp. stewartii) of corn and Maize dwarf mosaic virus

open access: yesPest Management Science, Volume 81, Issue 4, Page 1988-1999, April 2025.
Schematic diagram of the single and dual RPA‐CRISPR/Cas12a/13a diagnostic assays for the detection of Pantoea stewartii subsp. stewartii and Maize dwarf mosaic virus. The validated assays provide a useful and sensitive molecular tool for detecting two quarantine pathogens of maize within a minimal resource framework suitable for fast‐tracking the ...
Qian Tian   +6 more
wiley   +1 more source

Ashwagandha: Is It Safe? Part 2: A Preclinical Evidence Review

open access: yesPhytotherapy Research, EarlyView.
ABSTRACT The preclinical evidence for the safety of ashwagandha (Withania somnifera (L.) Dunal, AS) is reviewed, and its preparations (extracts) and constituents, from the general toxicity in animal models to in vitro and cell culture studies, which may elucidate mechanisms of action and explain clinical case reports.
Elizabeth M. Williamson, Thomas Brendler
wiley   +1 more source

A two‐step authentication framework for Mobile ad hoc networks [PDF]

open access: yes, 2007
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C.   +2 more
core  

Microglial Activation Under Hypoxic Conditions in Early Alzheimer's Disease: Can Natural SIRT1 Activators Be Therapeutic Allies in the Inflammation–Energy Axis?

open access: yesPhytotherapy Research, EarlyView.
ABSTRACT Alzheimer's disease (AD) is a progressive neurodegenerative condition characterized by a preclinical stage that typically lasts for decades. Early on during this time, microglia react to pathological changes and become protective and even transiently delay neurodegeneration.
Sara Merlo   +3 more
wiley   +1 more source

Post-Quantum Migration of the Tor Application

open access: yesJournal of Cybersecurity and Privacy
The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt ...
Denis Berger   +2 more
doaj   +1 more source

Thermosensitive Nanostructured Coacervates Developed by Mixing ABA‐ and AB‐Block Copolymers and Their Unique Sustained Release of Nano‐Micelles in a Regulated Manner

open access: yesSmall, EarlyView.
Polyion complex micelles composed of blends of ABA and AB block copolymers can form coacervates with a hexagonally packed cylinder nanostructure after heating. The resulting coacervates can release the micelles under physiological conditions in a zero‐order kinetics, possessing cargo proteins.
Takumi Egashira   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy