Results 51 to 60 of about 78,038 (262)

Positively Charged Polymer‐Brush MOFs for Large‐Area, Pressure‐Resistant Gas Separation Membranes

open access: yesAdvanced Materials, EarlyView.
A universal POPA strategy enables positively charged polymer‐brush MOFs with self‐adaptive interfacial interlocking to resist aggregation under fast processing. This design ensures seamless dispersion within large‐area selective layers, achieving 1 m‐wide roll‐to‐roll fabrication of pressure‐resistant MMCMs with tunable CO2 separation performance ...
Yi Yang   +11 more
wiley   +1 more source

Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus

open access: yesIEEE Access, 2020
Analyzing security protocol web implementations is a crucial part of web security. Based on the model extraction technology, this paper first defines SubJavaScript and SubPython languages, and then establishes mapping models from SubPython and ...
Xudong He   +5 more
doaj   +1 more source

Recent Advances on Thermochromic Inks for Security Applications

open access: yesAdvanced Materials Technologies, EarlyView.
Thermochromic security inks have garnered interest in recent years as security elements for authentication, information encryption, and anti‐counterfeiting. This review outlines different types of thermochromic materials, how they have been developed as functional inks, and how advancements in property enhancement, sustainability, and printing ...
Duarte B. Oliveira   +5 more
wiley   +1 more source

Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS

open access: yesIEEE Access, 2019
Ensuring sustainable-security of web applications for minimizing security breaches and enhancing users' trust and satisfaction is the foremost priority of all security experts and web developers.
Alka Agrawal   +3 more
doaj   +1 more source

Chemically Doped Conductive Polymers for Wearable Health Monitoring

open access: yesAdvanced Materials Technologies, EarlyView.
Among conductive polymers, poly(3,4‐ethylenedioxythiophene):poly(styrenesulfonate) (PEDOT:PSS), polyaniline (PANI), and polypyrrole (PPy) are the most studied and applied. Chemical doping significantly boosts intrinsic conductivity and mechanical robustness.
Mengdi Zuo   +5 more
wiley   +1 more source

Photonic Hybrid Integration: Strategies and Promises of Advanced Additive Manufacturing

open access: yesAdvanced Optical Materials, EarlyView.
Heterogeneous photonic integration combines wafer bonding, transfer printing, and advanced multi‐photon lithography to realize compact, adaptable photonic systems. This review highlights breakthroughs in hybrid materials, metrology, and 4D printing, revealing how the convergence of traditional and emerging fabrication unlocks scalable, high‐performance
Zhitian Shi   +3 more
wiley   +1 more source

A Web Second-Order Vulnerabilities Detection Method

open access: yesIEEE Access, 2018
Second-order vulnerabilities are more subtle and more destructive than the first-order vulnerabilities. After researching and analyzing the principles of web penetration testing and second-order attack principles, this paper proposes a method to detect ...
Miao Liu, Bin Wang
doaj   +1 more source

Vat Photopolymerized HEMA/HEA Hydrogels for Solvent‐Responsive Transparency and Optical Encryption

open access: yesAdvanced Optical Materials, EarlyView.
Vat‐photopolymerized HEMA/HEA hydrogels exhibit reversible transparency‐opacity switching via hydration‐induced microphase separation and solvent exchange. The printed materials enable hydration sensing, optical encryption, and information storage, while maintaining high ductility and reversible rheology.
Murad Ali   +4 more
wiley   +1 more source

Enhancing Online Security: A Novel Machine Learning Framework for Robust Detection of Known and Unknown Malicious URLs

open access: yesJournal of Theoretical and Applied Electronic Commerce Research
The rapid expansion of the internet has led to a corresponding surge in malicious online activities, posing significant threats to users and organizations.
Shiyun Li, Omar Dib
doaj   +1 more source

Rancang Bangun Keamanan Web Service Dengan Metode Ws-Security

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2012
Abstrak Web service menggunakan teknologi XML dalam melakukan pertukaran data. Umumnya penggunaan web service terjadi pertukaran data ataupun informasi penting yang perlu dijaga keamanannya.
Ari Muzakir, Ahmad Ashari
doaj   +1 more source

Home - About - Disclaimer - Privacy