Results 61 to 70 of about 360,424 (323)
Threats to the information system in the physical environment and cyberspace [PDF]
The purpose of the study is to supplement and update the list of threats to the confidentiality and integrity of the system. The article focuses on the already compiled list of threats and a model of system, but also considers new threats and types of threats.
arxiv
MALOnt: An Ontology for Malware Threat Intelligence [PDF]
Malware threat intelligence uncovers deep information about malware, threat actors, and their tactics, Indicators of Compromise(IoC), and vulnerabilities in different platforms from scattered threat sources. This collective information can guide decision making in cyber defense applications utilized by security operation centers(SoCs).
arxiv +1 more source
The use of police information notices is cases of alleged harrasment by journalists.
openaire +3 more sources
A hybrid‐nested microneedle/cryogel scaffold (MQW‐CMg‐MOF) is designed for efficient biofilm removal and accelerated healing of diabetic wounds. The scaffold shows substantial biofilm removal in vitro and in a preclinical diabetic swine biofilm‐infected wound model compared to the control.
Syed Muntazir Andrabi+11 more
wiley +1 more source
It is difficult to get the news from poems yet men die miserably every day for lack of what is found there. “Asphodel, That Greeny Flower” by William Carlos Williams, a physician and poet Beware the threat of the spores, Bad news parcels bide their time. They lurk to enter the unsuspecting And unleash dormant evil that multiplies.
openaire +3 more sources
All‐Cellulose‐Based Photonic Glitters
Uniform, disc‐shaped photonic CNC glitters with adjustable structural colors and diameters are fabricated on hydrophilic ethyl cellulose films using electrospray deposition. By employing patterned ethyl cellulose films with pre‐designed hydrophilic regions, photonic patterns can be created with these all‐cellulose‐based glitters, demonstrating their ...
Ting Wang+5 more
wiley +1 more source
Geometric multi‐bit patterning based on dynamic wetting and dewetting phenomena creates roulette‐like Physical Unclonable Function (PUF) labels with stochastic yet deterministic properties. This method leverages the solutal‐Marangoni effect for high randomness while achieving deterministic multinary patterns through polygonal confinement of binary ...
Yeongin Cho+8 more
wiley +1 more source
A Strong and Water‐Retaining Biomass Adhesive Inspired by Tofu
Drawing inspiration from the formation mechanism of the traditional food tofu, a strong and water‐retaining adhesive is designed using the soybean meal (SM) oxidized by glucose oxidase (GOx) and calcium sulfate oligomer (CSO). This design strategy effectively addresses the conflicting requirements of water‐resistant bonding strength and water retention
Jiawei Shao+8 more
wiley +1 more source
ATHAFI: Agile Threat Hunting And Forensic Investigation [PDF]
Attackers rapidly change their attacks to evade detection. Even the most sophisticated Intrusion Detection Systems that are based on artificial intelligence and advanced data analytic cannot keep pace with the rapid development of new attacks. When standard detection mechanisms fail or do not provide sufficient forensic information to investigate and ...
arxiv