Results 121 to 130 of about 977,056 (333)
Threat Hunting the Shadows: Detecting Adversary Lateral Movement With Elasticsearch
This research investigates the elusive tactic of lateral movement employed by adversaries within a compromised network. The focus is on identifying the mechanisms and techniques used for lateral movement, with a particular emphasis on credential access ...
Naif Alsharabi+5 more
doaj +1 more source
This study developed a nitrogen‐strengthened copper‐iron‐zinc (N‐CuFeZn) alloy bioactive dressing integrated with electromagnetic stimulation. The coaxial dressing, made from 0.04 mm filaments with 1120 MPa tensile strength, showed that electromagnetic activation enhanced therapeutic outcomes by increasing VEGF expression, promoting angiogenesis (2.1 ...
Xiaohui Qiu+9 more
wiley +1 more source
Adaptive Security Event Visualization for Continuous Monitoring
The field of information security routinely produces the need for a security information and event management system operator who would be capable of durable and extensive (e.g., workday-long) monitoring of the system in his control with well-timed ...
Anatoly Valerievich Elizarov+1 more
doaj
Safety Evaluation of Repeated Application of Polymeric Microarray Patches in Miniature Pigs
This study demonstrates the safety of repeated application of three types of microarray patches (MAPs), hydrogelforming, dissolving, and implantable, over four weeks in miniature pigs. No adverse skin or systemic effects were observed, supporting the clinical potential of MAPs as safe and effective drug delivery platforms.
Qonita Kurnia Anjani+4 more
wiley +1 more source
Generic Continuity of Operations/Continuity of Government Plan for State-Level Transportation Agencies, Research Report 11-01 [PDF]
The Homeland Security Presidential Directive 20 (HSPD-20) requires all local, state, tribal and territorial government agencies, and private sector owners of critical infrastructure and key resources (CI/KR) to create a Continuity of Operations ...
Edwards, Frances L.+2 more
core +1 more source
CYBER SECURITY IN TRANSPORTATION
The fast pace of scientific and technological progress in terms of informatisation and digitalisation of society entails the risk of increasing cyber threats, which pose a serious problem for organisations, as the pace of development of digital and ...
Olga V. Knyazkina+3 more
doaj +1 more source
This study develops 3D‐printed Mg‐MC/PLGA scaffolds with varying Mg concentrations (0–20%). The 5% Mg scaffold shows optimal cytocompatibility, osteogenic activity in vitro, and significantly enhances bone regeneration in rabbits, improving bone volume and mechanical strength.
Shihang Liu+9 more
wiley +1 more source
Improving Information Security Situational Awareness and Event Management [PDF]
Taloudelliset menetykset, jotka kohdistuvat tietojärjestelmien toimintakunnon ja vakauden horjumiseen vaativat proaktiivista työskentelyä ja nopeaa reagoimista muutoksiin ja ongelmatilanteisiin.
Korjala, Joni
core +1 more source
Roll‐To‐Roll Production of Smart Dressings for Wound Monitoring
This study presents a roll‐to‐roll manufactured smart wound dressing capable of visually monitoring key wound biomarkers, including pH, humidity, and temperature. By integrating colorimetric sensors into flexible dressing substrates, the device offers real‐time, equipment‐free insights for infection detection and wound management, representing a ...
Ziheng Wang+14 more
wiley +1 more source