Results 61 to 70 of about 360,424 (323)

Threats to the information system in the physical environment and cyberspace [PDF]

open access: yesarXiv, 2020
The purpose of the study is to supplement and update the list of threats to the confidentiality and integrity of the system. The article focuses on the already compiled list of threats and a model of system, but also considers new threats and types of threats.
arxiv  

MALOnt: An Ontology for Malware Threat Intelligence [PDF]

open access: yes, 2020
Malware threat intelligence uncovers deep information about malware, threat actors, and their tactics, Indicators of Compromise(IoC), and vulnerabilities in different platforms from scattered threat sources. This collective information can guide decision making in cyber defense applications utilized by security operation centers(SoCs).
arxiv   +1 more source

Warning … or threat?

open access: yesBritish Journalism Review, 2015
The use of police information notices is cases of alleged harrasment by journalists.
openaire   +3 more sources

Engineered Peptides‐Based Hybrid‐Nested Microneedle Effectively Treat Biofilm‐Infected Diabetic Wounds

open access: yesAdvanced Functional Materials, EarlyView.
A hybrid‐nested microneedle/cryogel scaffold (MQW‐CMg‐MOF) is designed for efficient biofilm removal and accelerated healing of diabetic wounds. The scaffold shows substantial biofilm removal in vitro and in a preclinical diabetic swine biofilm‐infected wound model compared to the control.
Syed Muntazir Andrabi   +11 more
wiley   +1 more source

Threat of the Spores [PDF]

open access: yesEmerging Infectious Diseases, 2004
It is difficult to get the news from poems yet men die miserably every day for lack of what is found there. “Asphodel, That Greeny Flower” by William Carlos Williams, a physician and poet Beware the threat of the spores, Bad news parcels bide their time. They lurk to enter the unsuspecting And unleash dormant evil that multiplies.
openaire   +3 more sources

All‐Cellulose‐Based Photonic Glitters

open access: yesAdvanced Functional Materials, EarlyView.
Uniform, disc‐shaped photonic CNC glitters with adjustable structural colors and diameters are fabricated on hydrophilic ethyl cellulose films using electrospray deposition. By employing patterned ethyl cellulose films with pre‐designed hydrophilic regions, photonic patterns can be created with these all‐cellulose‐based glitters, demonstrating their ...
Ting Wang   +5 more
wiley   +1 more source

Roulette‐Inspired Physical Unclonable Functions: Stochastic yet Deterministic Multi‐Bit Patterning through the Solutal Marangoni Effect

open access: yesAdvanced Functional Materials, EarlyView.
Geometric multi‐bit patterning based on dynamic wetting and dewetting phenomena creates roulette‐like Physical Unclonable Function (PUF) labels with stochastic yet deterministic properties. This method leverages the solutal‐Marangoni effect for high randomness while achieving deterministic multinary patterns through polygonal confinement of binary ...
Yeongin Cho   +8 more
wiley   +1 more source

JACMP 2020–2024

open access: yes
Journal of Applied Clinical Medical Physics, EarlyView.
Susan L. Richardson
wiley   +1 more source

A Strong and Water‐Retaining Biomass Adhesive Inspired by Tofu

open access: yesAdvanced Functional Materials, EarlyView.
Drawing inspiration from the formation mechanism of the traditional food tofu, a strong and water‐retaining adhesive is designed using the soybean meal (SM) oxidized by glucose oxidase (GOx) and calcium sulfate oligomer (CSO). This design strategy effectively addresses the conflicting requirements of water‐resistant bonding strength and water retention
Jiawei Shao   +8 more
wiley   +1 more source

ATHAFI: Agile Threat Hunting And Forensic Investigation [PDF]

open access: yesarXiv, 2020
Attackers rapidly change their attacks to evade detection. Even the most sophisticated Intrusion Detection Systems that are based on artificial intelligence and advanced data analytic cannot keep pace with the rapid development of new attacks. When standard detection mechanisms fail or do not provide sufficient forensic information to investigate and ...
arxiv  

Home - About - Disclaimer - Privacy