Results 91 to 100 of about 801,622 (296)

Cybersecurity

open access: yesInternet Policy Review, 2020
Cybersecurity covers the broad range of technical and social issues that must be considered to protect networked information systems. The importance of the concept has increased as so many government, business, and day-to-day activities globally have ...
Michael Veale, Ian Brown
doaj   +1 more source

Security challenges and solutions for e-business [PDF]

open access: yes, 2018
The advantages of economic growth and increasing ease of operation afforded by e-business and e-commerce developments are unfortunately matched by growth in cyber attacks.
Bulajoul, W   +4 more
core  

RNA‐Micelles as Self‐Assembling Structures for Efficient Co‐Delivery of Synergistic siRNA and Nucleoside Analogues to Treat CRC Lung Metastasis

open access: yesAdvanced Functional Materials, EarlyView.
Two kinds of self‐assembled RNA micelles were used to co‐deliver synergistic siRNA and nucleoside analogues for the treatment of colorectal cancer lung metastases. Near‐complete elimination of lung cancer metastases was confirmed in an orthotopic lung metastasis model constructed using human colorectal cancer lung metastases patient surgical samples to
Kai Jin   +4 more
wiley   +1 more source

Spatially Tailorable Liquid Crystalline Elastomer Alignment During Digital Light Process 3D Printing

open access: yesAdvanced Functional Materials, EarlyView.
Here, we report the fabrication of 3D printable liquid crystalline elastomer (LCE) structures with spatially tailorable alignment domains within the same layer. This work addresses the long‐standing challenge of preparing complex 3D LCE architectures with patterned functional domains to achieve nonlinear deformations. Fabrication of multi‐domains in 3D
Adam Bischoff   +8 more
wiley   +1 more source

SOCIALLY-ENGINEERING ACTIVITY IN THE INFORMATION EPOCH

open access: yesРоссийский технологический журнал, 2016
This article aims at identifying the dynamics of socioengineering activities in the information age, its possibilities and prospects. Conceptual analysis of contemporary approaches to social engineering undertaken by the authors showed that despite the ...
L. F. Matronina, A. N. Agafonov
doaj   +1 more source

Switchable Supramolecular Adhesive by Tuning Interfacial Bonding and Modulus

open access: yesAdvanced Functional Materials, EarlyView.
The supramolecular adhesive (HyDiP) shows reversible adhesion and recyclability. In the dehydrated state, it is dense, stiff (E ≈445 MPa), transparent, and provides strong bonding with adhesion strengths up to 4.65 MPa. In the hydrated state, it becomes porous, soft (E ≈0.11 MPa), and detaches easily, enabling sustainable high‐strength applications ...
Rumin Fu   +10 more
wiley   +1 more source

Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions

open access: yes, 2011
As computation spreads from computers to networks of computers, and migrates into cyberspace, it ceases to be globally programmable, but it remains programmable indirectly: network computations cannot be controlled, but they can be steered by local ...
Meadows, Catherine, Pavlovic, Dusko
core  

Three‐Dimensional Hierarchical Nanowire‐Networks with Deep‐Focus Tolerance and Adhesion Robustness for Harsh‐Environment SERS Sensing

open access: yesAdvanced Functional Materials, EarlyView.
A 3D nanowire‐network SERS substrate with robust adhesion is developed, featuring pronounced z‐direction optical activity, ultralow detection limit (1.5 × 10−13 M), and excellent signal uniformity (RSD < 10%). Enabled by enhanced light scattering, increased optical density of states, and structural reinforcement, the substrate demonstrates stable, high‐
Jinglai Duan   +6 more
wiley   +1 more source

PHISHING AWARENESS AND SECURITY CONCERNS: ANALYZING THE ROLE OF ANTI-PHISHING KNOWLEDGE AND INTERNET EXPERIENCE IN ONLINE BANKING USERS

open access: yesJurnal Ilmu Keluarga dan Konsumen
Phishing has become Indonesia's most prevalent cybercrime from 2017 to 2022, primarily due to the collection of users' personal information. The purpose of this study is to examine how security concerns are impacted by social engineering, internet ...
Rista Junita Nur’aini   +1 more
doaj   +1 more source

Modelling Socio-Technical Aspects of Organisational Security [PDF]

open access: yes, 2016
Identification of threats to organisations and risk assessment often take into consideration the pure technical aspects, overlooking the vulnerabilities originating from attacks on a social level, for example social engineering, and abstracting away the ...
Ivanova, Marieta Georgieva
core   +3 more sources

Home - About - Disclaimer - Privacy