Results 111 to 120 of about 305,823 (288)

Evaluation of the IT-security level of network videosurveillance

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
The main elements of the structure of the network videosurveillance systems has been described. The statistical study on the criterion of proximity has been performed: the predominant use on the objects of different categories in the Republic of Belarus.
V. V. Malikov
doaj  

Design and hardware implementation of LED block cipher for vehicles keyless entry systems

open access: yesEgyptian Informatics Journal
Security is paramount in vehicle keyless entry systems, as they are increasingly targeted by various attacks, including relay attacks, theft, and espionage. Keyless entry systems are particularly vulnerable to relay attacks, where attackers intercept and
Ayoub Mhaouch   +4 more
doaj   +1 more source

Machine Learning–Enhanced Fluorescence Cryptography with NADH‐Responsive Polymer Dots

open access: yesENERGY &ENVIRONMENTAL MATERIALS, EarlyView.
This study presents a smart anticounterfeiting system using semiconducting polymer dots (Pdots) that exhibit tunable fluorescence responses to NADH. By integrating these dynamic optical signals with machine learning–based decoding, the work establishes a secure and intelligent encryption platform, showing a novel strategy that links chemical sensing ...
Zhengkun Zhan   +7 more
wiley   +1 more source

Synergistic Microstructure and Dielectric Engineering of Recyclable Single‐Electrode Triboelectric Nanogenerators for Sustainable Smart Homes

open access: yesENERGY &ENVIRONMENTAL MATERIALS, EarlyView.
A recyclable triboelectric nanogenerator integrating a pseudo‐honeycomb microstructure with liquid metal doping achieves 120% higher output (122 mW m−2) and >90% retention over seven cycles, enabling self‐powered smart home functions. The performance of single‐electrode triboelectric nanogenerators (SE‐TENGs) is governed by the effective contact area ...
Chencheng Hu   +10 more
wiley   +1 more source

Model Checking Access Control Protocol for Spreadsheets

open access: yesJournal of Information and Organizational Sciences
Spreadsheets are one of the most used software systems in business and academia. Since the first introduction of electronic spreadsheets for personal computers in 1979, spreadsheets have significantly evolved.
Miro Zdilar
doaj   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

A Comprehensive Review on the Significance, Sources, and Applications of Virtual Water on Global Platform

open access: yesFood Safety and Health, EarlyView.
A conceptual framework of virtual water showing its sources, major applications, components of the virtual water footprint, and emerging future directions. The diagram emphasizes the growing role of virtual water in global sustainability and resource planning.
Priti Bhowmik   +2 more
wiley   +1 more source

The Many Facets of Workplace Moral Courage: Development and Validation of a Multidimensional Scale

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT In the battle against unethical behavior in organizations, fostering employees' moral courage proves vital beyond conventional regulation and compliance efforts. To propel this frontier and empower individuals to uphold moral values, a robust measure of workplace moral courage becomes imperative.
Nicole Witt, Carmen Tanner
wiley   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

IP PBX Asterisk NOW telecommunication network and choice of tools for carrying out attacks. Development and research of the attack scheme to the developed client–server network on the basis of Wi-Fi

open access: yesҚарағанды университетінің хабаршысы. Физика сериясы, 2016
Communication of clients with the server passes through a wireless point of Wi-Fi access. The attacking device is the laptop which has the software package of CommView for Wi-Fi.
M.Z. Yakubova, T.G. Serikov
doaj  

Home - About - Disclaimer - Privacy