Results 91 to 100 of about 801,622 (296)
Cybersecurity covers the broad range of technical and social issues that must be considered to protect networked information systems. The importance of the concept has increased as so many government, business, and day-to-day activities globally have ...
Michael Veale, Ian Brown
doaj +1 more source
Security challenges and solutions for e-business [PDF]
The advantages of economic growth and increasing ease of operation afforded by e-business and e-commerce developments are unfortunately matched by growth in cyber attacks.
Bulajoul, W +4 more
core
Two kinds of self‐assembled RNA micelles were used to co‐deliver synergistic siRNA and nucleoside analogues for the treatment of colorectal cancer lung metastases. Near‐complete elimination of lung cancer metastases was confirmed in an orthotopic lung metastasis model constructed using human colorectal cancer lung metastases patient surgical samples to
Kai Jin +4 more
wiley +1 more source
Spatially Tailorable Liquid Crystalline Elastomer Alignment During Digital Light Process 3D Printing
Here, we report the fabrication of 3D printable liquid crystalline elastomer (LCE) structures with spatially tailorable alignment domains within the same layer. This work addresses the long‐standing challenge of preparing complex 3D LCE architectures with patterned functional domains to achieve nonlinear deformations. Fabrication of multi‐domains in 3D
Adam Bischoff +8 more
wiley +1 more source
SOCIALLY-ENGINEERING ACTIVITY IN THE INFORMATION EPOCH
This article aims at identifying the dynamics of socioengineering activities in the information age, its possibilities and prospects. Conceptual analysis of contemporary approaches to social engineering undertaken by the authors showed that despite the ...
L. F. Matronina, A. N. Agafonov
doaj +1 more source
Switchable Supramolecular Adhesive by Tuning Interfacial Bonding and Modulus
The supramolecular adhesive (HyDiP) shows reversible adhesion and recyclability. In the dehydrated state, it is dense, stiff (E ≈445 MPa), transparent, and provides strong bonding with adhesion strengths up to 4.65 MPa. In the hydrated state, it becomes porous, soft (E ≈0.11 MPa), and detaches easily, enabling sustainable high‐strength applications ...
Rumin Fu +10 more
wiley +1 more source
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions
As computation spreads from computers to networks of computers, and migrates into cyberspace, it ceases to be globally programmable, but it remains programmable indirectly: network computations cannot be controlled, but they can be steered by local ...
Meadows, Catherine, Pavlovic, Dusko
core
A 3D nanowire‐network SERS substrate with robust adhesion is developed, featuring pronounced z‐direction optical activity, ultralow detection limit (1.5 × 10−13 M), and excellent signal uniformity (RSD < 10%). Enabled by enhanced light scattering, increased optical density of states, and structural reinforcement, the substrate demonstrates stable, high‐
Jinglai Duan +6 more
wiley +1 more source
Phishing has become Indonesia's most prevalent cybercrime from 2017 to 2022, primarily due to the collection of users' personal information. The purpose of this study is to examine how security concerns are impacted by social engineering, internet ...
Rista Junita Nur’aini +1 more
doaj +1 more source
Modelling Socio-Technical Aspects of Organisational Security [PDF]
Identification of threats to organisations and risk assessment often take into consideration the pure technical aspects, overlooking the vulnerabilities originating from attacks on a social level, for example social engineering, and abstracting away the ...
Ivanova, Marieta Georgieva
core +3 more sources

