Results 151 to 160 of about 1,328,609 (285)
Nine quick tips for software containerization. [PDF]
Moreau D, Wiebels K.
europepmc +1 more source
All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak +4 more
wiley +1 more source
Understanding security challenges in the software supply chain through causal relationships. [PDF]
Adem A +4 more
europepmc +1 more source
Solution‐processed organic photodetectors (OPDs) based on two novel low band gap non‐fullerene acceptors BZIC‐2F and BZIC‐2Cl, when blended with common polymer donor P3HT, extend detection range beyond 1200 nm with superior performance, rivaling costly inorganic sensors and past literature.
Zhuoran Qiao +18 more
wiley +1 more source
PASTA-4-PHT: a pipeline for automated security and technical audits for the personal health train. [PDF]
Welten S +9 more
europepmc +1 more source
A thermally adaptive plasmonic metasurface, functionalized with poly(N‐isopropylacrylamide) (PNIPAM) and anti‐CD63 antibodies, enables precise, on‐demand capture and release of extracellular vesicles (EVs). Delivering high recovery, improved purity, and intact vesicle structure, the platform offers a versatile, label‐free solution for real‐time EV ...
Beyza Nur Kucuk +7 more
wiley +1 more source
Hybrid Framework for Secure Low-Power Data Encryption with Adaptive Payload Compression in Resource-Constrained IoT Systems. [PDF]
Choi YR, Jeong HY, Moon S.
europepmc +1 more source
Phase boundaries between Co2P and CoP are constructed through a controlled transformation of Co to Co2P‐CoP branched nanoparticles. The polycrystalline mixed‐phase Co2P‐CoP branches are enriched with phase boundaries that stabilize Co active sites for OER. This work highlights phase boundary engineering as a powerful approach to tailor active sites and
Zeno R. Ramadhan +10 more
wiley +1 more source
Less is more: usefulness of data flow diagrams and large language models for security threat validation. [PDF]
Mbaka WB, Tuma K.
europepmc +1 more source
Elephant‐skin‐inspired crack networks are programmed in porous diatomaceous earth (DE)‐cement composites using substrate‐guided, stress‐concentration induced fracture. The resulting crack lattices act as capillary conduits that redistribute water, while the porous matrix stores moisture.
Qingya Huang +5 more
wiley +1 more source

