Results 51 to 60 of about 198,702 (277)
A numerical–experimental framework is developed for characterizing multi‐matrix fiber‐reinforced polymers (MM‐FRPs) combining epoxy and polyurethane matrices. Harmonic bending tests are integrated with finite element model updating (FEMU) to simultaneously identify elastic and viscoelastic material parameters.
Rodrigo M. Dartora +4 more
wiley +1 more source
Cloud computing technologies have increased the diversity and complexity of security expertise needed to prevent cyber attacks. decisionIn software and system architect area, The expertise of security personnel in these security technologies is highly ...
Taisho Sasada +4 more
doaj +1 more source
Deterministic Detection of Single Ion Implantation
Focused ion beam implantation with high detection efficiencies will enable the rapid and scalable fabrication of advanced spin‐based technologies such as qubits. This work presents the detection efficiencies of a wide range of ions implanted into solid‐state hosts, with efficiencies of >90% recorded for ion species and substrate combinations of ...
Mason Adshead +6 more
wiley +1 more source
Autonomous identity-based threat segmentation for zero trust architecture
Zero Trust Architecture (ZTA) fundamentally redefine network security by adopting a ''trust nothing, verify everything'' approach requiring identity verification for all access.
Sina Ahmadi
doaj +1 more source
This study reports lightweight polyetherimide triply periodic minimal surfaces lattices coated with carbon nanotube‐reinforced epoxy that combine mechanical robustness with self‐sensing. The conformal coating enhances stiffness, strength and energy absorption while enabling reliable strain monitoring.
A. Triay +3 more
wiley +1 more source
PASTA‐ELN: Simplifying Research Data Management for Experimental Materials Science
Research data management faces ongoing hurdles as many ELNs remain complex and restrictive. PASTA‐ELN offers an open‐source, cross‐platform solution that prioritizes simplicity, offline access, and user control. Its in tuitive folder structure, modular Python add‐ons, and open formats enable seamless documentation, FAIR data practices, and easy ...
S. Brinckmann, G. Winkens, R. Schwaiger
wiley +1 more source
Towards the computer systems design based on Zero Trust Architecture
The work is devoted to theoretical and practical aspects of computer systems design based on the zero trust concept. Based on the system thinking of analyzing existing zero trust systems and theoretical models used in their design, the work describes key
A. I. Brazhuk, E. V. Olizarovich
doaj +1 more source
The urgent and indispensable requirement for secure and efficient remote work compels organizations to reconsider their approach to safeguarding themselves against cyber threats.
Yitian Zhang
doaj +1 more source
The Reputation, Opinion, Credibility and Quality (ROCQ) Scheme [PDF]
An implicit assumption of trust in the participants is at the basis of most Peer-to-Peer (P2P) networks. However, in practice, not all participants are benign or cooperative. Identifying such peers is critical to the smooth and effective functioning of a
Battiti, Roberto, Garg, Anurag
core
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware
Attacks targeting software on embedded systems are becoming increasingly prevalent. Remote attestation is a mechanism that allows establishing trust in embedded devices.
Asokan, N. +7 more
core +1 more source

