Results 61 to 70 of about 2,702,156 (313)
An Integral Cybersecurity Approach Using a Many-Objective Optimization Strategy
Data networks and computing devices have experienced exponential growth. Within a short span of time, they have opened new digital frontiers while also bringing forth new threats.
Omar Salinas+3 more
doaj +1 more source
Objective Posttraumatic osteoarthritis (PTOA) accounts for nearly 12% of osteoarthritis incidences and often occurs after anterior cruciate ligament (ACL) tear. Ensuring the uptake of preventive treatments for PTOA requires that investigators and clinicians understand factors influencing patients to seek preventive therapies.
Lily M. Waddell+10 more
wiley +1 more source
Video Intelligence as a component of a Global Security system [PDF]
This paper describes the evolution of our research from video analytics to a global security system with focus on the video surveillance component. Indeed video surveillance has evolved from a commodity security tool up to the most efficient way of tracking perpetrators when terrorism hits our modern urban centers. As number of cameras soars, one could
arxiv
Current Trends and Future Perspective for Cold Spray Metal‐Ceramic Composites
The use of cold spray (CS) technology for creating cermet deposits, combining ceramic and metallic components, is advancing rapidly. Cermets offer excellent temperature handling and erosion resistance for diverse applications. This review outlines the current state of the art, focusing on the deposition dynamics and strategies to optimize the ...
Romario A. Wicaksono+2 more
wiley +1 more source
Security monitoring and incident management systems have become the main research focus in the area of intelligent railway control systems. In this work, we discuss a system architecture of multilevel intelligent control system in Russian Railway ...
A. V. Chernov+3 more
doaj +1 more source
Human-as-a-security-sensor for harvesting threat intelligence
Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less likely the target of successful attacks. Existing
Manfred Vielberth+2 more
doaj +1 more source
PC4PM: A Tool for Privacy/Confidentiality Preservation in Process Mining [PDF]
Process mining enables business owners to discover and analyze their actual processes using event data that are widely available in information systems. Event data contain detailed information which is incredibly valuable for providing insights. However, such detailed data often include highly confidential and private information.
arxiv
Low‐Velocity Penetration Impact Behavior of Triply Periodic Minimal Surface Strut‐Based Lattices
Triply periodic minimal surface (TPMS)‐based lattices are gaining attention for their multifunctional properties in applications as aeronautics and automotive, which involve low‐velocity impact loading. This work evaluates the low‐velocity penetration impact behavior of five distinct TPMS architectures.
Lucía Doyle+2 more
wiley +1 more source
Ultrathin, flexible neural probes are developed with an innovative, biomimetic design incorporating brain tissue‐compatible materials. The material system employs biomolecule‐based encapsulation agents to mitigate inflammatory responses, as demonstrated through comprehensive in vitro and in vivo studies.
Jeonghwa Jeong+7 more
wiley +1 more source
A Recursive PLS (Partial Least Squares) based Approach for Enterprise Threat Management [PDF]
Most of the existing solutions to enterprise threat management are preventive approaches prescribing means to prevent policy violations with varying degrees of success. In this paper we consider the complementary scenario where a number of security violations have already occurred, or security threats, or vulnerabilities have been reported and a ...
arxiv