Results 171 to 180 of about 318,491 (290)
Enhancing IoT-based healthcare security with grey filter bayesian CNN and optimization algorithms. [PDF]
Kalaivani A +7 more
europepmc +1 more source
Bio‐based and (semi‐)synthetic zwitterion‐modified novel materials and fully synthetic next‐generation alternatives show the importance of material design for different biomedical applications. The zwitterionic character affects the physiochemical behavior of the material and deepens the understanding of chemical interaction mechanisms within the ...
Theresa M. Lutz +3 more
wiley +1 more source
Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]
Nauman M +4 more
europepmc +1 more source
Phishing Attacks in Social Engineering: A Review
Kofi Sarpong Adu-Manu +3 more
openaire +1 more source
MOFs and COFs in Electronics: Bridging the Gap between Intrinsic Properties and Measured Performance
Metal‐organic frameworks (MOFs) and covalent organic frameworks (COFs) hold promise for advanced electronics. However, discrepancies in reported electrical conductivities highlight the importance of measurement methodologies. This review explores intrinsic charge transport mechanisms and extrinsic factors influencing performance, and critically ...
Jonas F. Pöhls, R. Thomas Weitz
wiley +1 more source
Spark plasma sintering enables rapid processing of porous organic polymer (POP) from fine powders to a freestanding and mechanically robust monolith. The sintering process retains the CO2 adsorption capacity and CO2/N2 selectivity, making the monolith more suitable as a solid sorbent for practical carbon capture applications.
Duan Li +4 more
wiley +1 more source
Dimensionally constrained adversarial attack and defense in wind power forecasting. [PDF]
Min Y +5 more
europepmc +1 more source
A spleen‐targeting hybrid nanoplatform (RBCMV‐LNP‐RP) harnessing erythrophagocytosis mimics senescent red blood cell clearance to achieve spleen‐specific delivery of rapamycin. This biomimetic system enables selective accumulation in splenic macrophages, orchestrating systemic immune reprogramming and promoting mucosal healing in an inflammatory bowel ...
Jun Kwon +10 more
wiley +1 more source
Research on network security vulnerability risk contagion in software supply chain based on system dynamics. [PDF]
Cai H, Xiong Q, Lian S.
europepmc +1 more source

