Results 61 to 70 of about 557,385 (336)
An overview of design principles and scalable fabrication strategies for multifunctional bio‐based packaging. Radiative cooling films, modified‐atmosphere films/membranes, active antimicrobial/antioxidant platforms, intelligent optical/electrochemical labels, and superhydrophobic surfaces are co‐engineered from material chemistry to mesoscale structure
Lei Zhang +6 more
wiley +1 more source
AI–Guided 4D Printing of Carnivorous Plants–Inspired Microneedles for Accelerated Wound Healing
This work presents an artificial intelligence (AI)‐guided 4D‐printed microneedle platform inspired by carnivorous plants for wound healing. A thermo‐responsive shape memory polymer enables body temperature–triggered self‐coiling for autonomous wound closure.
Hyun Lee +21 more
wiley +1 more source
Unstructured Big Data Threat Intelligence Parallel Mining Algorithm
To efficiently mine threat intelligence from the vast array of open-source cybersecurity analysis reports on the web, we have developed the Parallel Deep Forest-based Multi-Label Classification (PDFMLC) algorithm.
Zhihua Li +3 more
doaj +1 more source
QBC Inconsistency-Based Threat Intelligence IOC Recognition
With the increase in cyber-attacks, Cyber Threat Intelligence (CTI) has become a hot topic. Log detection using Indicators of Compromise (IOCs) to detect critical risks, such as compromised internal hosts, is the most common use scenario for CTI ...
Wenli Zeng +4 more
doaj +1 more source
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L. +3 more
core +1 more source
Magnetic Textiles: A Review of Materials, Fabrication, Properties, and Applications
Magnetic textiles (M‐textiles) are emerging as a programmable materials platform that merges magnetic matter with hierarchical textile structures. This article consolidates magnetic material classes, textile architectures, and fabrication and magnetization strategies, revealing structure–property–function relationships that govern magneto‐mechanical ...
Li Ke +3 more
wiley +1 more source
Domain-Oriented Topic Discovery Based on Features Extraction and Topic Clustering
Topic detection technology can automatically discover new topics on the Internet. This paper investigates domain-oriented feature extraction methods, and proposes a keyword feature extraction method ITFIDF-LP, a subject word feature extraction method LDA-
Xiaofeng Lu +4 more
doaj +1 more source
Amphiphilic chloroazobenzenes, bearing different amino acids as end groups alanine, phenylalanine, and valine, exhibit excellent photoisomerizations. Varying structures of three amino acid groups participate in supramolecular formations and therefore photoinduced morphological transformations via adjusting intermolecular interactions. These interaction
Shuangshuang Meng +3 more
wiley +1 more source
From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
An average medium-sized organisation logs approx. 10 to 500 mln events per day on the system. Only less than 5% of threat alerts are being investigated by the specialised staff, leaving the security hole open for potential attacks.
Neda Afzaliseresht +4 more
doaj +1 more source
Technological Threat Attribution, Trust and Confidence, and the Contestability of National Security Policy [PDF]
The world has been asked to believe that China is a source of cyberthreat and that Russia is meddling in U.S. elections. Western populations are being asked to trust the words of intelligence agencies and world leaders that these unspecified ...
Hoverd, W
core

