Results 91 to 100 of about 557,385 (336)

Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild [PDF]

open access: green, 2023
Giuseppe Siracusano   +8 more
openalex   +1 more source

A Cationic Supramolecule With Potent Antifungal Activity, Single‐Species Selectivity, and Strong Synergy With Echinocandins

open access: yesAdvanced Science, EarlyView.
We introduce a new membrane‐active antifungal design, Gua‐SMACS‐16, that exhibits high potency and single‐species selectivity for C. tropicalis while sparing other close species in the Candida genus. Moreover, when combining with caspofungin, a clinical antifungal drug inhibiting 1,3‐β‐glucan synthase, they exhibit ultra‐strong synergy across a panel ...
Tianjiao Dai   +8 more
wiley   +1 more source

Microsphere‐Modulated Sensing‐in‐Energy Supercapacitor With Self‐Filtering Ultra‐Large Signal Under High‐g Shocks

open access: yesAdvanced Science, EarlyView.
To overcome severe signal oscillation under extreme impact conditions, this work presents a Sensing‐in‐Energy microdevice which integrates a MEMS inertial structure directly within a supercapacitor electrolyte cavity. Utilizing shock‐driven transient contact and electrolyte damping for signal self‐filtering, it achieves weak‐oscillation, large ...
Zhihao Zheng   +7 more
wiley   +1 more source

Big data security analysis method based on self-update threat intelligence database

open access: yesDianxin kexue, 2018
Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.
Yanfang HOU, Jinhua WANG
doaj   +2 more sources

Wireless, Deep‐Seeing Smart Pill: A NIR‐II Fluorescence Imaging Capsule Endoscope for Gastrointestinal Cancer

open access: yesAdvanced Science, EarlyView.
A novel near‐infrared‐II fluorescent imaging capsule endoscope that detects specific fluorescence signals above 900 nm enables highly sensitive, targeted imaging of gastrointestinal cancer tissue. This wirelessly powered and magnetically controlled “smart pill” achieves high sensitivity and deep tissue penetration, allowing precise, non‐invasive ...
Weicheng Wang   +10 more
wiley   +1 more source

Network security situational awareness model based on threat intelligence

open access: yesTongxin xuebao, 2021
In order to deal with the problems that the increasing scale of the network in the real environment leads to the continuous high incidence of network attacks, the threat intelligence was applied to situational awareness, and the situational awareness ...
Hongbin ZHANG   +3 more
doaj   +2 more sources

Cyber Soldier project - A threat-led methodology for assessing the Digital Resilience of cybersecurity systems [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
We present Cyber Soldier Methodology and tool set that introduces a threat-led methodology for assessing the digital resilience of cybersecurity systems within organizations required to comply with European regulatory frameworks such as the Digital ...
Mariusz Stawowski   +6 more
doaj   +1 more source

Selective Screening of Rail Passengers, MTI 06-07 [PDF]

open access: yes, 2005
The threat of another major terrorist attack in the United States remains high, with the greatest danger coming from local extremists inspired by events in the Middle East.
Butterworth, Bruce Robert   +1 more
core   +1 more source

Deciphering Intricacies in Directional CO2 Conversion From Electrolysis to CO2 Batteries

open access: yesAdvanced Energy Materials, EarlyView.
This review will delve into the inherent connections and distinctions of CO2‐directed conversion in ECO2RR and CO2 batteries, in terms of product types, catalyst selection, catalytic mechanisms, and electrochemical performances, while proposing a benchmarking framework for the evaluation of CO2 batteries and innovative CO2 battery configurations for ...
Changfan Xu   +5 more
wiley   +1 more source

Trust Inference Mechanism Based on Threat Intelligence and Device Health Features

open access: yesIEEE Access
In today’s increasingly severe cybersecurity threat landscape, threat intelligence from a single source can no longer fully reflect the actual risks faced by a device.
Chun-Li Lin, Guan-Hao Cheng
doaj   +1 more source

Home - About - Disclaimer - Privacy