Results 111 to 120 of about 2,702,156 (313)
Information Security Policy: A Management Practice Perspective [PDF]
Considerable research effort has been devoted to the study of Policy in the domain of Information Security Management (ISM). However, our review of ISM literature identified four key deficiencies that reduce the utility of the guidance to organisations implementing policy management practices.
arxiv
Smart Dust for Chemical Mapping
This review article explores the advancement of smart dust networks for high‐resolution spatial and temporal chemical mapping. Comprising miniature, wireless sensors, and communication devices, smart dust autonomously collects, processes, and transmits data via swarm‐based communication.
Indrajit Mondal, Hossam Haick
wiley +1 more source
Cyberthreat Detection from Twitter using Deep Neural Networks [PDF]
To be prepared against cyberattacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds. Open source intelligence platforms, namely social media networks
arxiv
Laser micropatterning is presented as a promising technology in the search for autonomous dew water harvesting materials. Laser‐grooved metallic surfaces achieve simultaneously high infrared emissivity and superhydrophilicity, which gives them self‐cooling properties under atmospheric radiative deficit and the ability to condense water in an efficient ...
Pablo Pou‐Álvarez+7 more
wiley +1 more source
Challenges and Opportunities of Upconversion Nanoparticles for Emerging NIR Optoelectronic Devices
The special photo‐responsiveness of upconversion nanoparticles has opened up a new path for the advancement of near‐infrared (NIR)‐responsive optoelectronics. However, challenges such as low energy‐conversion efficiency and high nonradiative losses still persist.
Sunyingyue Geng+7 more
wiley +1 more source
Efficient and Standardized Alarm Rationalization for Cybersecurity Monitoring
Threat monitoring in cybersecurity systems is often jeopardized by alarm flooding, which frequently occurs in Security Information and Event Management (SIEM) solutions due to the unnecessary annunciation of numerous logs and event data from a variety of
Sarah Alabdulhadi, Ali Al-Matouq
doaj +1 more source
Data Mining Approach in Security Information and Event Management [PDF]
Anita Rajendra Zope+2 more
openaire +1 more source
Materials Advances in Devices for Heart Disease Interventions
This review examines the crucial role of materials in heart disease interventions, focusing on strategies for monitoring, managing, and repairing heart conditions. It discusses the material requirements for medical devices, highlighting recent innovations and their impact on cardiovascular health.
Gagan K. Jalandhra+11 more
wiley +1 more source
A Formal Model of Security Controls' Capabilities and Its Applications to Policy Refinement and Incident Management [PDF]
Enforcing security requirements in networked information systems relies on security controls to mitigate the risks from increasingly dangerous threats. Configuring security controls is challenging; even nowadays, administrators must perform it without adequate tool support.
arxiv