Results 71 to 80 of about 2,521,807 (266)
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? [PDF]
Time-relevant and accurate threat information from public domains are essential for cyber security. In a constantly evolving threat landscape, such information assists security researchers in thwarting attack strategies. In this work, we collect and analyze threat-related information from Twitter to extract intelligence for proactive security. We first
arxiv
A hybrid‐nested microneedle/cryogel scaffold (MQW‐CMg‐MOF) is designed for efficient biofilm removal and accelerated healing of diabetic wounds. The scaffold shows substantial biofilm removal in vitro and in a preclinical diabetic swine biofilm‐infected wound model compared to the control.
Syed Muntazir Andrabi+11 more
wiley +1 more source
Denmark is a major pig exporter and applies a high level of biosecurity, with washing and disinfecting stations for returning livestock vehicles. The introduction of African Swine Fever (ASF) would have significant economic consequences related to loss ...
Yuqi Gao+5 more
doaj +1 more source
Al1‐xScxN‐Based Ferroelectric Domain‐Wall Memristors
(a) Conductive atomic force microscopy (CAFM) image of the initial state bidomain structure of the Al0.85Sc0.15N (a) showing an enhanced conductivity of the head‐to‐head domain boundary. (b) CAFM image of the same area after application of several −65 V, 1 s voltage pulses showing lower conductivity of the generated tail‐to‐tail domain walls.
Haidong Lu+11 more
wiley +1 more source
Transforming Cellulose Into Functional Three‐Dimensional Structures
Cellulose is promising for replacing synthetic polymers due to its excellent mechanical properties and low cost. This review highlights the recent advancements in transforming cellulose into functional 3D structures, including liquid gels and porous materials.
Xia Sun+5 more
wiley +1 more source
Assessment of POS Owners Awareness of Cybersecurity and Insider Threats in POS Kiosks Related Financial Crimes [PDF]
The introduction of point of sales POS technologies as a payment system was welcoming and constitutes one of the major breakthroughs in the efforts made to rejuvenate the global financial systems. However, like other information technology IT based financial systems, the POS also poses some cybersecurity security threats. The unique thing about the POS
arxiv
Microbubble‐Controlled Delivery of Biofilm‐Targeting Nanoparticles to Treat MRSA Infection
Here, an effective strategy using microbubble (MB)‐controlled delivery of biofilm‐targeting nanoparticles (BTNs) for removal and therapy of methicillin‐resistant Staphylococcus aureus (MRSA) biofilm infections is introduced. In vivo delivery of MB with BTN is demonstrated to silence key bacterial genes involved in biofilm formation (icaA), bacterial ...
Ju Yeon Chung+6 more
wiley +1 more source
A hollow‐structured Fe3O4@AgAu@PDA‐ZnPc nanosphere has been developed, exhibiting controllable catalytic activity and “photothermal‐photodynamic‐Ag+” coupling antibacterial characteristics. When subjected to a rotating magnetic field, these performances are uniquely enhanced by magnetic propulsion, allowing the nanosphere to function as a magnetic ...
Jing Wang+7 more
wiley +1 more source
AI-Based Energy Transportation Safety: Pipeline Radial Threat Estimation Using Intelligent Sensing System [PDF]
The application of artificial intelligence technology has greatly enhanced and fortified the safety of energy pipelines, particularly in safeguarding against external threats. The predominant methods involve the integration of intelligent sensors to detect external vibration, enabling the identification of event types and locations, thereby replacing ...
arxiv
To suppress uveal melanoma metastasis (UM), the GSH‐responsive polymer named NP@Oxa/Criz has been successfully prepared. NP@Oxa/Criz selectively accumulates in UM tumors, targeting HGF/c‐Met Axis to undermine the stemness and metastasis of UM while triggering immunogenic cell death through DAMPs release to boost anti‐tumor immunity.
Hui Tao+8 more
wiley +1 more source