Results 61 to 70 of about 801,622 (296)
Phase‐changing liquids enable untethered pneumatic actuation in soft robotics but suffer from volatility and storage challenges. This work reports a simple method to encapsulate Novec 7000 within micron‐thin alginate shells via in situ injection and ionic crosslinking.
Rayan A. M. Basodan +3 more
wiley +1 more source
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight.
David Airehrour +2 more
doaj +1 more source
Social Engineering: Concepts, Techniques, and Security Countermeasures
This research paper describes the social engineering concepts, techniques, and security countermeasures. This research aims to study various social engineering techniques to find the best countermeasures that would help to reduce social engineering attacks.
openaire +1 more source
Influence of an Oxygen‐Free Atmosphere on Diamond‐Single‐Grain Scratching of Ti–6Al–4V
Single‐grain scratching of Ti–6Al–4V is investigated under controlled, oxygen‐free, and ambient atmospheres using a novel experimental setup with in situ high‐speed imaging. The approach enables direct observation of chip formation and adhesion under suppressed oxidation.
Berend Denkena +2 more
wiley +1 more source
Social Engineering a General Approach [PDF]
Social engineering is considered to be a taboo subject in nowadays society. It involves the use of social skills or to obtain usernames, passwords, credit card data, or to compromise or altering the information and systems of an entity.
Valerica GREAVU-SERBAN, Oana SERBAN
doaj +1 more source
Phase Field Failure Modeling: Brittle‐Ductile Dual‐Phase Microstructures under Compressive Loading
The approach by Amor and the approach by Miehe and Zhang for asymmetric damage behavior in the phase field method for fracture are compared regarding their fitness for microcrack‐based failure modeling. The comparison is performed for the case of a dual‐phase microstructure with a brittle and a ductile constituent.
Jakob Huber, Jan Torgersen, Ewald Werner
wiley +1 more source
Handling Human Hacking: Creating a Comprehensive Defensive Strategy Against Modern Social Engineering [PDF]
Social engineering is one of the most devastating threats to any company or business. Rather than relying upon technical flaws in order to break into computer networks, social engineers utilize a suave personality in order to deceive individuals through ...
Snyder, Charles
core +1 more source
Web development evolution: the assimilation of web engineering security [PDF]
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core +1 more source
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana +2 more
wiley +1 more source
Consistency and stability of risk indicators: The case of road infrastructures [PDF]
Over the last decade, the World Road Association – PIARC and several European research projects, among which Ecoroads, have encouraged a promising reflection on risk analysis methods, acceptance criteria and safety practices applied to the road system ...
Di Mascio, Paola +2 more
core +1 more source

