Results 71 to 80 of about 1,402,735 (323)

A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints

open access: yesNetwork and Distributed System Security Symposium, 2020
In 2016, law enforcement dismantled the infrastructure of the Avalanche bulletproof hosting service, the largest takedown of a cybercrime operation so far.
Victor Le Pochat   +7 more
semanticscholar   +1 more source

Breathable Graphene Oxide‐Polymer Composite Membranes With Two‐Step Barrier Mechanism Against Nerve Agents

open access: yesAdvanced Functional Materials, EarlyView.
ABSTRACT Breathable membranes that reject chemical warfare agents (CWAs) are required for next‐generation protective apparel. A dual‐function graphene oxide (GO)‐polyamine architecture is introduced that addresses the long‐standing tradeoff between vapor transmission and CWA selectivity.
Hyungjun Kim   +6 more
wiley   +1 more source

Climate, food (in)security and conflict in the Bangladesh delta: Myths and puzzles

open access: yesEnvironment and Security
Bangladesh is customarily presented as a poster child for climate change and conflict given its dense population and susceptibility to climate variability. This vulnerability exacerbates existing challenges such as food insecurity and conflict potential.
Ma Suza, J. Warner, Han van Dijk
semanticscholar   +1 more source

Meniscus Pixel Printing for Contact‐Lens Vision Sensing and Robotic Control

open access: yesAdvanced Functional Materials, EarlyView.
A visual‐sensing contact lens is enabled by meniscus pixel printing (MPP), which rapidly patterns a 200 µm perovskite photodetector pixel in 1 s without masks, vacuum processing, or bulky equipment. A deep‐learning‐based super‐resolution reconstructs sparse on‐lens signals into 80 × 80 high‐resolution visual information, while AI‐driven eye‐tracking ...
Byung‐Hoon Gong   +7 more
wiley   +1 more source

Activities of the National Police of Ukraine During Martial Law as a Factor for Ensuring National Security and European Integration of the State

open access: yesLaw and Safety
The article analyses the current state of organisation and functioning of the Ukrainian National Police system of bodies and units under martial law. It examines the specifics of police measures to create a secure environment depending on the type and ...
K. L. Buhaichuk
doaj   +1 more source

Secured Credit and Bankruptcy: A Call for the Federalization of Personal Property Security Law [PDF]

open access: yes, 1987
In recent years, the need for systems monitoring the current in ation pressure in pneumatic tires has grown dramatically. One way to monitor the in ation pressure is to use the fact that the tire reacts like a spring when excited from road roughness. The
Phillips, David M.
core   +2 more sources

Atomic Layer Deposition in Transistors and Monolithic 3D Integration

open access: yesAdvanced Functional Materials, EarlyView.
Transistors are fundamental building blocks of modern electronics. This review summarizes recent progress in atomic layer deposition (ALD) for the synthesis of two‐dimensional (2D) metal oxides and transition‐metal dichalcogenides (TMDCs), with particular emphasis on their enabling role in monolithic three‐dimensional (M3D) integration for next ...
Yue Liu   +5 more
wiley   +1 more source

The Minimum Wage Campaign in Brazil and the Fight against Inequality

open access: yesGlobal Labour Journal, 2015
This article summarises the Brazilian experience on the minimum wage campaign and the results and challenges brought by the increase in real value of the minimum wage.
Frederico Luiz Barbosa de Melo
doaj   +1 more source

Bioprinting Organs—Science or Fiction?—A Review From Students to Students

open access: yesAdvanced Healthcare Materials, EarlyView.
Bioprinting artificial organs has the potential to revolutionize the medical field. This is a comprehensive review of the bioprinting workflow delving into the latest advancements in bioinks, materials and bioprinting techniques, exploring the critical stages of tissue maturation and functionality.
Nicoletta Murenu   +18 more
wiley   +1 more source

A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data

open access: yesComputers
Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks.
Abdulrahman Hussian   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy