Results 91 to 100 of about 437,233 (263)
Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions [PDF]
Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones ...
Alexandru TABUSCA, Ion LUNGU
core
This article presents the NFDI‐MatWerk Ontology (MWO), a Basic Formal Ontology‐based framework for interoperable research data management in materials science and engineering (MSE). Covering consortium structures, research data management resources, services, and instruments, MWO enables semantic integration, Findable, Accessible, Interoperable, and ...
Hossein Beygi Nasrabadi +4 more
wiley +1 more source
Analysis of Open Environment Sign-in Schemes-Privacy Enhanced & Trustworthy Approach
The third party based authentication possess users privacy concerns in an open environment such as links and traces user identities across various services.
Zubair Ahmad Khattak +2 more
doaj +1 more source
Bimetallic (NiFe) and trimetallic (NiFeCr) nanoalloys (NAs) are synthesized using corresponding oxide mixtures using microwave hydrogen plasma within a few milliseconds. The process simultaneously 1) reduces metal oxides to metals; 2) downsizes the particles from micrometers to nanometers; and 3) blends the metals to form NAs.
Sachin Kumar +5 more
wiley +1 more source
Low‐Symmetry Weyl Semimetals: A Path to Ideal Topological States
This study presents a theoretical framework for realizing ideal Weyl semimetals, where Weyl nodes are well‐isolated at the Fermi level. The approach is exemplified in the low‐symmetry material Cu2SnSe3, which exhibits tunable topological phases, current‐induced orbital magnetization, and a strong circular photogalvanic effect, making it a promising ...
Darius‐Alexandru Deaconu +3 more
wiley +1 more source
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan +3 more
core +1 more source
Trust and the Goldacre Review: why trusted research environments are not about trust
Graham, M +3 more
openaire +3 more sources
A combinatorial library of dual‐functional antiviral oligomers incorporating N‐halamine and quaternary ammonium functionalities is developed for long‐lasting antiviral activity. The lead materials exhibit rapid and durable antiviral activity against SARS‐CoV‐2 variants and influenza H1N1, with 4 to 5 log reduction in viral copies at 5 mg mL−1 ...
Eid Nassar‐Marjiya +14 more
wiley +1 more source
Advertising Media and the Green Environmental Aspect [PDF]
Previous research has shown that consumer trust in advertising is low and continues to diminish. Researchers have also found that a big share of advertising investments is placed in less favorable media which can contribute to consumers’ increasing ...
Rademaker, Claudia A.
core
This study highlights the importance of accounting for stoichiometric hydrogen produced when utilizing Si photocatalysts. The stoichiometric contribution is sacrificial reagent dependent and decreases with increasing sterics around the catalyst surface.
Sarrah H. Putwa +4 more
wiley +1 more source

