Results 111 to 120 of about 1,030,766 (332)

Ice Lithography: Recent Progress Opens a New Frontier of Opportunities

open access: yesAdvanced Functional Materials, EarlyView.
This review focuses on recent advancements in ice lithography, including breakthroughs in compatible precursors and substrates, processes and applications, hardware, and digital methods. Moreover, it offers a roadmap to uncover innovation opportunities for ice lithography in fields such as biological, nanoengineering and microsystems, biophysics and ...
Bingdong Chang   +9 more
wiley   +1 more source

Adaptive Security Event Visualization for Continuous Monitoring

open access: yesБезопасность информационных технологий, 2014
The field of information security routinely produces the need for a security information and event management system operator who would be capable of durable and extensive (e.g., workday-long) monitoring of the system in his control with well-timed ...
Anatoly Valerievich Elizarov   +1 more
doaj  

Application of modern methods for information security risks evaluation of a critical information infrastructure facility

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
The practice of assessing IT-security risks of Critical Information Infrastructure (CII) facilities is considered. The methods of Event Tree Analysis (ETA), Fault Tree Analysis (FTA), and the International Standard ISO/IEC 27005:2022, which establishes ...
I. I. Livshitz
doaj   +1 more source

Trafficking in Persons: U.S. Policy and Issues for Congress [PDF]

open access: yes, 2012
[Excerpt] This report focuses on international and domestic human trafficking and U.S. policy responses, with particular emphasis on the TVPA and its subsequent reauthorizations.
Siskin, Alison, Wyler, Liana Sun
core   +4 more sources

Trusted CI Experiences in Cybersecurity and Service to Open Science

open access: yes, 2019
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew   +18 more
core   +1 more source

Durable Physically Mixed Microporous and Mesoporous MOFs/Nanofiber Aerogel 3D Composites for Effective Toxic Gas Capture and Organophosphonate Detoxification

open access: yesAdvanced Functional Materials, EarlyView.
Ultralight 3D nanofibrous aerogels embedded with metal‐organic frameworks effectively capture and neutralize toxic gases and organophosphonates. Incorporating mesoporous UiO‐66‐NH2 and HKUST‐1 into PAN/PVP fibers enables high MOF loading while maintaining mechanical strength and structural stability.
Mai O. Abdelmigeed   +6 more
wiley   +1 more source

In Situ Study of Resistive Switching in a Nitride‐Based Memristive Device

open access: yesAdvanced Functional Materials, EarlyView.
In situ TEM biasing experiment demonstrates the volatile I‐V characteristic of MIM lamella device. In situ STEM‐EELS Ti L2/L3 ratio maps provide direct evidence of the oxygen vacancies migrations under positive/negative electrical bias, which is critical for revealing the RS mechanism for the MIM lamella device.
Di Zhang   +19 more
wiley   +1 more source

A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats

open access: yesSensors
Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric
Tuba Arif, Byunghyun Jo, Jong Hyuk Park
doaj   +1 more source

InSPeCT: Integrated Surveillance for Port Container Traffic [PDF]

open access: yes, 2011
This paper describes a fully-operational content-indexing and management system, designed for monitoring and profiling freight-based vehicular traffic in a seaport environment.
Ferguson, Paul   +4 more
core  

SECURITY INFORMATION AND EVENT MANAGEMENT SYSTEMS

open access: yes, 2013
The fast development of computer technology and electronic networks has contributed to the introduction of information systems to different economic activities. This has significantly increased the exposure to security threats and potential intrusions into such systems.
openaire   +1 more source

Home - About - Disclaimer - Privacy