Results 111 to 120 of about 305,823 (288)
Evaluation of the IT-security level of network videosurveillance
The main elements of the structure of the network videosurveillance systems has been described. The statistical study on the criterion of proximity has been performed: the predominant use on the objects of different categories in the Republic of Belarus.
V. V. Malikov
doaj
Design and hardware implementation of LED block cipher for vehicles keyless entry systems
Security is paramount in vehicle keyless entry systems, as they are increasingly targeted by various attacks, including relay attacks, theft, and espionage. Keyless entry systems are particularly vulnerable to relay attacks, where attackers intercept and
Ayoub Mhaouch +4 more
doaj +1 more source
Machine Learning–Enhanced Fluorescence Cryptography with NADH‐Responsive Polymer Dots
This study presents a smart anticounterfeiting system using semiconducting polymer dots (Pdots) that exhibit tunable fluorescence responses to NADH. By integrating these dynamic optical signals with machine learning–based decoding, the work establishes a secure and intelligent encryption platform, showing a novel strategy that links chemical sensing ...
Zhengkun Zhan +7 more
wiley +1 more source
A recyclable triboelectric nanogenerator integrating a pseudo‐honeycomb microstructure with liquid metal doping achieves 120% higher output (122 mW m−2) and >90% retention over seven cycles, enabling self‐powered smart home functions. The performance of single‐electrode triboelectric nanogenerators (SE‐TENGs) is governed by the effective contact area ...
Chencheng Hu +10 more
wiley +1 more source
Model Checking Access Control Protocol for Spreadsheets
Spreadsheets are one of the most used software systems in business and academia. Since the first introduction of electronic spreadsheets for personal computers in 1979, spreadsheets have significantly evolved.
Miro Zdilar
doaj +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
A conceptual framework of virtual water showing its sources, major applications, components of the virtual water footprint, and emerging future directions. The diagram emphasizes the growing role of virtual water in global sustainability and resource planning.
Priti Bhowmik +2 more
wiley +1 more source
The Many Facets of Workplace Moral Courage: Development and Validation of a Multidimensional Scale
ABSTRACT In the battle against unethical behavior in organizations, fostering employees' moral courage proves vital beyond conventional regulation and compliance efforts. To propel this frontier and empower individuals to uphold moral values, a robust measure of workplace moral courage becomes imperative.
Nicole Witt, Carmen Tanner
wiley +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Communication of clients with the server passes through a wireless point of Wi-Fi access. The attacking device is the laptop which has the software package of CommView for Wi-Fi.
M.Z. Yakubova, T.G. Serikov
doaj

