Results 191 to 200 of about 158,430 (308)
FISTS: A Field-based Security Testing Tool for Updates in Software-Defined Networks
Fabrizio Pastore, Jahanzaib Malik
openalex +1 more source
Test-Based Security Certification of Composite Services
Marco Anisetti +3 more
openalex +2 more sources
An epi‐intraneural interface is developed through in silico optimization and a novel tridimensional microfabrication pipeline. The device integrates penetrating and epineural contacts on a flexible substrate. Mechanical, electrochemical, and in vivo testing in rat and pig reveal robust implantation, low‐threshold activation, and site‐dependent ...
Federico Ciotti +14 more
wiley +1 more source
Network Security Assessment Using Internal Network Penetration Testing Methodology
Deni Satria +3 more
openalex +2 more sources
Spatially Tailorable Liquid Crystalline Elastomer Alignment During Digital Light Process 3D Printing
Here, we report the fabrication of 3D printable liquid crystalline elastomer (LCE) structures with spatially tailorable alignment domains within the same layer. This work addresses the long‐standing challenge of preparing complex 3D LCE architectures with patterned functional domains to achieve nonlinear deformations. Fabrication of multi‐domains in 3D
Adam Bischoff +8 more
wiley +1 more source
Network security analysis based on feature selection and optimized fireworks algorithm. [PDF]
Zhou L +5 more
europepmc +1 more source
Lipid nanoparticles containing messenger RNA are characterized by sedimentation velocity analytical ultracentrifugation using UltraScan's new Custom Grid algorithm to provide multi‐dimensional distributions for partial specific volume (particle density), molar mass, sedimentation, diffusion, and hydrodynamic radius.
Sophia Bird +8 more
wiley +1 more source
A holistic framework for strengthening security of healthcare data through encryption utilizing blockchain technology. [PDF]
Venkataradhakrishnamurty P, Malathi K.
europepmc +1 more source
Porous carbon host materials are investigated for their possible usage in liquid alkali‐metal negative electrodes. X‐ray computed tomography reveals pore‐filling behavior under various conditions: non‐wetting, forced wetting, and spontaneous wetting. The applicability of porous carbon in electrochemical cells is demonstrated at high areal capacities ...
Johannes Baller +10 more
wiley +1 more source
TESTING THE SECURITY ESP32 INTERNET OF THINGS DEVICES
Oleksii Barybin +2 more
openalex +2 more sources

