Results 81 to 90 of about 2,521,807 (266)
Security Architecture and Protocols for Secure MQTT-SN
Message Queuing Telemetry Transport (MQTT) is a de facto standard for various Internet of Things (IoT) and industrial IoT applications. The data produced by a publisher are delivered to several subscribers via an MQTT broker.
Chang-Seop Park, Hye-Min Nam
doaj +1 more source
Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities [PDF]
Insider threats, as one type of the most challenging threats in cyberspace, usually cause significant loss to organizations. While the problem of insider threat detection has been studied for a long time in both security and data mining communities, the traditional machine learning based detection approaches, which heavily rely on feature engineering ...
arxiv
—Intelligent Transport Systems (ITS) are instrumental in optimizing transportation networks, enhancing efficiency, and promoting sustainable mobility in smart cities and advanced technological environments.
Mada Alharb, Abdulatif Alabdulatif
semanticscholar +1 more source
Surface modification using mussel‐derived polydopamine (PDA) is a versatile and robust biocompatible strategy that enables direct application to various epidermal surfaces, regardless of their morphological complexity or surface characteristics. The PDA‐coated epidermis exhibits multiple anti‐biofouling functionalities, including antibacterial and anti‐
Su Eon Lee+14 more
wiley +1 more source
The microbiome and resistome of apple fruits alter in the post-harvest period
Background A detailed understanding of antimicrobial resistance trends among all human-related environments is key to combat global health threats. In food science, however, the resistome is still little considered.
Birgit Wassermann+4 more
doaj +1 more source
Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification [PDF]
Preventing organizations from Cyber exploits needs timely intelligence about Cyber vulnerabilities and attacks, referred as threats. Cyber threat intelligence can be extracted from various sources including social media platforms where users publish the threat information in real time.
arxiv
In this study, a novel cationic peptide, IW is designed and synthesized, with a tandem‐repeat sequence demonstrating potent activities against a broad spectrum of clinically relevant Carbapenem‐resistant Enterobacteriaceae in both the planktonic and biofilm states. IW is then formulated with P407 to form IW‐P407 colloids.
Ping Zeng+5 more
wiley +1 more source
Vulnerable road user safety and freight vehicles: A case study in North Carolina and Tennessee
Increasing freight traffic has posed greater road safety threats to Vulnerable Road Users (VRUs), including pedestrians and bicyclists, in urban communities.
Jueyu Wang+4 more
doaj
Genetic basis of arsenite and cadmium tolerance in
Background Arsenic and cadmium are widely distributed in nature and pose serious threats to the environment and human health. Exposure to these nonessential toxic metals may result in a variety of human diseases including cancer.
Dawes Ian W+7 more
doaj +1 more source
One of the measures taken by the International Maritime Organization to prevent terrorist acts at sea was adoption of amendments to the International Convention for the Safety of Life at Sea, aimed at ensuring that ships and their cargo do not become ...
M. S. Kupriyanovich
semanticscholar +1 more source