Results 51 to 60 of about 1,730,729 (295)

Exploration of Food Security Challenges towards More Sustainable Food Production: A Systematic Literature Review of the Major Drivers and Policies

open access: yesFoods, 2022
Food security is a central priority for international policy as one of the world’s most significantly urgent targets to achieve. It is considered one of the most pressing issues in many countries, the degree of food security representing the level of ...
Sabreen Wahbeh   +3 more
doaj   +1 more source

The economics of user effort in information security [PDF]

open access: yes, 2009
A significant number of security breaches result from employees' failures to comply with security policies. The cause is often an honest mistake, such as when an employee enters their password in a phishing website, believing it to be a legitimate one.1 ...
Beautement, A, Sasse, A
core   +1 more source

AI–Guided 4D Printing of Carnivorous Plants–Inspired Microneedles for Accelerated Wound Healing

open access: yesAdvanced Materials, EarlyView.
This work presents an artificial intelligence (AI)‐guided 4D‐printed microneedle platform inspired by carnivorous plants for wound healing. A thermo‐responsive shape memory polymer enables body temperature–triggered self‐coiling for autonomous wound closure.
Hyun Lee   +21 more
wiley   +1 more source

Retirement Policies, Employment, and Unemployment [PDF]

open access: yes, 1979
[Excerpt] There is a growing consensus among economists that reliance on aggregate demand policies alone will not be sufficient to move the economy to full employment with a nonaccelerating inflation rate, and that policies which alter the structure of ...
Ehrenberg, Ronald G
core   +1 more source

Accelerating Discovery to Deployment: Argonne's Materials Engineering Research Facility (MERF) and Its Role in Scaling Materials Technologies for Water and Resource Solutions

open access: yesAdvanced Materials Technologies, EarlyView.
In this Perspective, we highlight the processing science and scale‐up capabilities of the Materials Engineering Research Facility (MERF) at the U.S. Department of Energy's Argonne National Laboratory, with an emphasis on practical solutions for sustainable water and critical resource recovery. We demonstrate how national laboratories bridge fundamental
Yuepeng Zhang   +9 more
wiley   +1 more source

Uniunea Europeană – proiecţii şi disfuncţionalităţi [PDF]

open access: yesPolis: Revista de Stiinte Politice, 2019
The article offers a synthetic perspective on European Union project, considering the initial perspectives in the spotlight of growing social discontent. Under this approach, we can notice several functional problems concerning fields like military power,
Alexandru MAMINA
doaj  

Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain [PDF]

open access: yes, 2009
The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness.
Dimkov, T., Hartel, P.H., Pieters, W.
core   +2 more sources

End‐to‐End Sensing Systems for Breast Cancer: From Wearables for Early Detection to Lab‐Based Diagnosis Chips

open access: yesAdvanced Materials Technologies, EarlyView.
This review explores advances in wearable and lab‐on‐chip technologies for breast cancer detection. Covering tactile, thermal, ultrasound, microwave, electrical impedance tomography, electrochemical, microelectromechanical, and optical systems, it highlights innovations in flexible electronics, nanomaterials, and machine learning.
Neshika Wijewardhane   +4 more
wiley   +1 more source

Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies

open access: yesProceedings 2020 Network and Distributed System Security Symposium, 2020
The Content Security Policy (CSP) mechanism was developed as a mitigation against script injection attacks in 2010. In this paper, we leverage the unique vantage point of the Internet Archive to conduct a historical and longitudinal analysis of how CSP deployment has evolved for a set of 10,000 highly ranked domains.
Roth, S   +4 more
openaire   +2 more sources

BGP Security in Partial Deployment: Is the Juice Worth the Squeeze? [PDF]

open access: yes, 2013
As the rollout of secure route origin authentication with the RPKI slowly gains traction among network operators, there is a push to standardize secure path validation for BGP (i.e., S*BGP: S-BGP, soBGP, BGPSEC, etc.).
Goldberg, Sharon   +2 more
core  

Home - About - Disclaimer - Privacy