Results 51 to 60 of about 546,292 (293)
With the development of information technology, the need to solve the problem of information security has increased, as it has become the most important strategic resource.
Bohdan Nikolaienko, Serhii Vasylenko
doaj +1 more source
Directional Liquid Transport Enabled pH‐Responsive Hierarchical Composite for Enhanced Wound Healing
A hierarchical composite with a gradient architecture transitioning from hydrophobic to hydrophilic layers integrates diode‐like liquid transport, efficient water absorption, breathability, and mechanical robustness. This device enables a multifunctional therapeutic platform with pH‐responsive dual‐drug release, providing synergistic anti‐inflammatory ...
Baolin Wang +5 more
wiley +1 more source
Responding to the challenge of efficiently leveraging Open-source Threat Intelligence Feeds (OTIFs) to enhance organizational security, this paper presents an innovative approach to automated threat identification using machine learning.
Othmane Cherqi +3 more
doaj +1 more source
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
Unstructured Big Data Threat Intelligence Parallel Mining Algorithm
To efficiently mine threat intelligence from the vast array of open-source cybersecurity analysis reports on the web, we have developed the Parallel Deep Forest-based Multi-Label Classification (PDFMLC) algorithm.
Zhihua Li +3 more
doaj +1 more source
Robust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing
We investigated 12 years DNS query logs of our campus network and identified phenomena of malicious botnet domain generation algorithm (DGA) traffic.
Hatma Suryotrisongko +3 more
doaj +1 more source
Surprise, Intelligence Failure, and Mass Casualty Terrorism [PDF]
This study aims to evaluate whether surprise and intelligence failure leading to mass casualty terrorism are inevitable. It explores the extent to which four factors - failures of public policy leadership, analytical challenges, organizational obstacles,
Copeland, Thomas Edgar
core
Bacteria‐Responsive Nanostructured Drug Delivery Systems for Targeted Antimicrobial Therapy
Bacteria‐responsive nanocarriers are designed to release antimicrobials only in the presence of infection‐specific cues. This selective activation ensures drug release precisely at the site of infection, avoiding premature or indiscriminate release, and enhancing efficacy.
Guillermo Landa +3 more
wiley +1 more source
From Intelligence gathering to Cyber Threat Detection [PDF]
Intelligence plays a key role in the detection and neutralisation of threat actors in cyberspace, particularly when dealing with advanced ones. However, the relationship between intelligence and the final detection capabilities is not well–defined in ...
Antonio VILLALON-HUERTA +2 more
doaj
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L. +3 more
core +1 more source

