Results 51 to 60 of about 557,385 (336)

Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports

open access: yes, 2018
Open-Source Projects and Libraries are being used in software development while also bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind of attack surface for a product in development.
Joshi, Anupam   +2 more
core   +1 more source

Arguments for exception in US security discourse [PDF]

open access: yes, 2017
In his influential State of Exception, Giorgio Agamben proposes that, even in apparently liberal western democracies, the state will routinely use the contingency of national emergency to suspend civil liberties and justify expansion of military and ...
Hunter, Duncan, MacDonald, Malcolm N
core   +2 more sources

Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application

open access: yesAdvanced Materials, EarlyView.
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong   +12 more
wiley   +1 more source

Cyber Threat Intelligence Platform [PDF]

open access: yes, 2016
Cieľom práce je vytvoriť webovú platformu, ktorá poskytne zjednodušený popis, spracovanie a výmenu bezpečnostných incidentov za pomoci dostupných štandardov STIX, TAXII, CybOX, IDEA.
Jacko, Jerguš
core  

Bacteria‐Responsive Nanostructured Drug Delivery Systems for Targeted Antimicrobial Therapy

open access: yesAdvanced Materials, EarlyView.
Bacteria‐responsive nanocarriers are designed to release antimicrobials only in the presence of infection‐specific cues. This selective activation ensures drug release precisely at the site of infection, avoiding premature or indiscriminate release, and enhancing efficacy.
Guillermo Landa   +3 more
wiley   +1 more source

Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]

open access: yes, 2015
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M   +12 more
core  

Freeform Manufacturing of Plant‐Based Structural Colors for Scalable Photonic and Mechanochromic Devices

open access: yesAdvanced Materials, EarlyView.
A green, freeform manufacturing approach that utilizes robust aqueous two‐phase systems to create intricate and scalable photonic structures and non‐planar mechanochromic hydrogel actuators from plant‐based hydroxypropyl cellulose. This approach broadens the structural possibilities of sustainable photonic devices and mechanochromic systems, offering ...
Xiao Song   +14 more
wiley   +1 more source

Analysing Language-Based Cyber Threats: An Examination of Cybersecurity for Chinese Text

open access: yesThe Pinnacle
Language barriers can impede effective communication and collaboration among cybersecurity professionals who speak different languages, potentially leading to misinterpretations of security policies, threat intelligence, and incident reports, thereby ...
Bruce Mills
doaj   +1 more source

Surprise, Intelligence Failure, and Mass Casualty Terrorism [PDF]

open access: yes, 2006
This study aims to evaluate whether surprise and intelligence failure leading to mass casualty terrorism are inevitable. It explores the extent to which four factors - failures of public policy leadership, analytical challenges, organizational obstacles,
Copeland, Thomas Edgar
core  

The Growing Threat of Agroterrorism and Strategies for Agricultural Defense [PDF]

open access: yes, 2020
Due to the dynamic nature of human conflict, non-traditional terror tactics have evolved to undermine the socioeconomic stability of targeted societies.
Forrest, Alyssa
core   +1 more source

Home - About - Disclaimer - Privacy