Results 51 to 60 of about 557,385 (336)
Open-Source Projects and Libraries are being used in software development while also bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind of attack surface for a product in development.
Joshi, Anupam +2 more
core +1 more source
Arguments for exception in US security discourse [PDF]
In his influential State of Exception, Giorgio Agamben proposes that, even in apparently liberal western democracies, the state will routinely use the contingency of national emergency to suspend civil liberties and justify expansion of military and ...
Hunter, Duncan, MacDonald, Malcolm N
core +2 more sources
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
Cyber Threat Intelligence Platform [PDF]
Cieľom práce je vytvoriť webovú platformu, ktorá poskytne zjednodušený popis, spracovanie a výmenu bezpečnostných incidentov za pomoci dostupných štandardov STIX, TAXII, CybOX, IDEA.
Jacko, Jerguš
core
Bacteria‐Responsive Nanostructured Drug Delivery Systems for Targeted Antimicrobial Therapy
Bacteria‐responsive nanocarriers are designed to release antimicrobials only in the presence of infection‐specific cues. This selective activation ensures drug release precisely at the site of infection, avoiding premature or indiscriminate release, and enhancing efficacy.
Guillermo Landa +3 more
wiley +1 more source
Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M +12 more
core
A green, freeform manufacturing approach that utilizes robust aqueous two‐phase systems to create intricate and scalable photonic structures and non‐planar mechanochromic hydrogel actuators from plant‐based hydroxypropyl cellulose. This approach broadens the structural possibilities of sustainable photonic devices and mechanochromic systems, offering ...
Xiao Song +14 more
wiley +1 more source
Analysing Language-Based Cyber Threats: An Examination of Cybersecurity for Chinese Text
Language barriers can impede effective communication and collaboration among cybersecurity professionals who speak different languages, potentially leading to misinterpretations of security policies, threat intelligence, and incident reports, thereby ...
Bruce Mills
doaj +1 more source
Surprise, Intelligence Failure, and Mass Casualty Terrorism [PDF]
This study aims to evaluate whether surprise and intelligence failure leading to mass casualty terrorism are inevitable. It explores the extent to which four factors - failures of public policy leadership, analytical challenges, organizational obstacles,
Copeland, Thomas Edgar
core
The Growing Threat of Agroterrorism and Strategies for Agricultural Defense [PDF]
Due to the dynamic nature of human conflict, non-traditional terror tactics have evolved to undermine the socioeconomic stability of targeted societies.
Forrest, Alyssa
core +1 more source

