Results 171 to 180 of about 198,702 (279)
The WeDDa framework for preventing smishing and vishing using protocol agnostic cryptographic trust. [PDF]
Salem MFM, Hamad EKI, El-Bendary MAM.
europepmc +1 more source
Science Needs a "Zero-Trust" Architecture
We are facing a crisis of transportability in computational science. When proofs depend on massive toolchains, specific hardware environments, or "accepted consensus," trust stops traveling. It gets stuck locally. In cybersecurity, we solved a similar problem by moving to a Zero-Trust Architecture: never trust, always verify.
openaire +3 more sources
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
ZenGuard a machine learning based zero trust framework for context aware threat mitigation using SIEM SOAR and UEBA. [PDF]
Hassan A +4 more
europepmc +1 more source
This review provides an overview of triboelectric nanogenerator (TENG)–based biomedical applications by classifying studies into electronic and ionic systems across attachable and implantable platforms. It summarizes key material choices, device structures, and working mechanisms that characterize current TENG‐based research, and outlines six future ...
Kyongtae Choi +12 more
wiley +1 more source
E-PTES-S: Enhanced Trust Evaluation via Multidimensional Spatiotemporal Fusion and Variance-Based Stability Sequence Extraction in IoT Sensing Networks. [PDF]
Liu J +5 more
europepmc +1 more source
Magnetic tunnel junctions (MTJs) using MgO tunnel barriers face challenges of high resistance‐area product and low tunnel magnetoresistance (TMR). To discover alternative materials, Literature Enhanced Ab initio Discovery (LEAD) is developed. The LEAD‐predicted materials are theoretically evaluated, showing that MTJs with dusting of ScN or TiN on ...
Sabiq Islam +6 more
wiley +1 more source
EdgeGuard-AI: Zero-Trust and Load-Aware Federated Scheduling for Secure and Low-Latency IoT Edge Networks. [PDF]
Alanazi AG, Alanazi HA.
europepmc +1 more source
Residual magnetization induces pronounced mechanical anisotropy in ultra‐soft magnetorheological elastomers, shaping deformation and actuation even without external magnetic fields. This study introduces a computational‐experimental framework integrating magneto‐mechanical coupling into topology optimization for designing soft magnetic actuators with ...
Carlos Perez‐Garcia +3 more
wiley +1 more source
Secure blockchain integrated deep learning framework for federated risk-adaptive and privacy-preserving IoT edge intelligence sets. [PDF]
Swathi K +6 more
europepmc +1 more source

