Results 111 to 120 of about 2,194 (257)
Software defined radio: a double-edged sword for security and privacy in wireless systems [PDF]
Tien Dang Vo-Huu
openalex +1 more source
Free‐standing plasmonic gold‐based fractal antennas are fabricated by 3D nanoprinting, employing focused electron beam induced deposition and an optimized purification method to remove carbon while conserving structural fidelity. Simulation and experiment show broadband plasmonic activity, including customizable polarizability, thereby paving the way ...
Verena Reisecker +6 more
wiley +1 more source
Software Design Flaw and Security Assurance Gap in Component-based Application Security & Privacy
Dr.Faisal Nabi
openalex +1 more source
Gd‐doped BFO (BGFO) exhibits a ∼2‐order reduction in leakage current owing to its lowest content of oxygen vacancies. This leads to a ∼2.5‐fold increase in remnant polarization. These improvements in BGFO effectively boost charge separation and transportation, resulting in the greatest incident photon‐to‐current efficiency of 12.9 ± 0.73% and a ∼1.5 ...
Ming‐Wei Chu +7 more
wiley +1 more source
A unidirectional cerebral organoid–organoid neural circuit is established using a microfluidic platform, enabling controlled directional propagation of electrical signals, neuroinflammatory cues, and neurodegenerative disease–related proteins between spatially separated organoids.
Kyeong Seob Hwang +9 more
wiley +1 more source
Privacy-Invasive Software in Filesharing
Personal privacy is affected by the occurrence of adware and spyware in peer-topeer tools. In an experiment, we investigated five file-sharing tools and found that they all contained ad-/spyware programs, and, that these hidden components communicated with several servers on the Internet.
Jacobsson, Andreas +2 more
openaire +1 more source
Bistable Photochromic Guest–Host Liquid Crystals for Rewritable and Switchable Photonic Devices
A photochromic DTCP‐based liquid crystal dye is incorporated into cholesteric liquid crystals (CLCs) to achieve optically and electrically tunable multistable states. In the open‐ring form, the system exhibits three electrically stable textures—planar, focal conic, and uniformly lying helix (ULH)—corresponding to reflective, scattering, and transparent
Wei‐Hsien Wu +4 more
wiley +1 more source
Privacy requirements engineering is a crucial aspect of privacy engineering. It aims to integrate privacy principles into organizational and technical processes throughout the software development lifecycle.
Guntur Budi Herwanto +3 more
doaj +1 more source

