Results 41 to 50 of about 1,662,639 (284)

Security risk assessment and protection in the chemical and process industry [PDF]

open access: yes, 2014
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute   +19 more
core   +1 more source

Revisiting Mission‐Oriented Cancer Research to tackle the increasing burden of cancer in Europe–a policy perspective

open access: yesMolecular Oncology, EarlyView.
Translational cancer research and its implementation through competitively selected Comprehensive Cancer Centers across Europe should be the primary policy focus for addressing the increasing cancer burden in Europe and counteract the present main strategy to convert cancer to a chronic disease.
Manuel Heitor   +2 more
wiley   +1 more source

Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel

open access: yesMathematics
An amplitude modulator plays an essential role in the implementation of continuous-variable quantum key distribution (CVQKD), whereas it may bring about a potential security loophole in the practical system.
Shengzhe Xu, Zicheng Zhou, Ying Guo
doaj   +1 more source

Converged Security and Information Management System as a Tool for Smart City Infrastructure Resilience Assessment

open access: yesSmart Cities, 2023
Current research on smart cities is primarily focused on the area of applicability of information and communication technologies. However, in the context of a multidisciplinary approach, it is also necessary to pay attention to the resilience and ...
Martin Hromada   +3 more
doaj   +1 more source

Quantum cryptography: a practical information security perspective [PDF]

open access: yes, 2009
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G.   +2 more
core   +1 more source

Experimental Measurement-Device-Independent Quantum Key Distribution with Imperfect Sources

open access: yes, 2016
Measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks, is the most promising solution to the security issues in practical quantum key distribution systems.
Bedroya, Olinka   +4 more
core   +1 more source

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

Security proof of practical quantum key distribution with detection-efficiency mismatch

open access: yesPhysical Review Research, 2021
Quantum key distribution (QKD) protocols with threshold detectors are driving high-performance QKD demonstrations. The corresponding security proofs usually assume that all physical detectors have the same detection efficiency.
Yanbao Zhang   +4 more
doaj   +1 more source

The skills required for transition to university and study in biological sciences: A student perspective

open access: yesFEBS Open Bio, EarlyView.
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley   +1 more source

Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis

open access: yesIEEE Access, 2020
Emerging trends that are shaping the future of the automotive industry include electrification, autonomous driving, sharing, and connectivity, and these trends keep changing annually.
Yousik Lee   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy