Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Mais filtros

Base de dados
Tipo de documento
Intervalo de ano de publicação
1.
Small ; : e2403169, 2024 Jul 07.
Artigo em Inglês | MEDLINE | ID: mdl-38973079

RESUMO

Nanopatterning on biomaterials has attracted significant attention as it can lead to the development of biomedical devices capable of performing diagnostic and therapeutic functions while being biocompatible. Among various nanopatterning techniques, electron-beam lithography (EBL) enables precise and versatile nanopatterning in desired shapes. Various biomaterials are successfully nanopatterned as bioresists by using EBL. However, the use of high-energy electron beams (e-beams) for high-resolutive patterning has incorporated functional materials and has caused adverse effects on biomaterials. Moreover, the scattering of electrons not absorbed by the bioresist leads to proximity effects, thus deteriorating pattern quality. Herein, EBL-based nanopatterning is reported by inducing molecular degradation of amorphous silk fibroin, followed by selectively inducing secondary structures. High-resolution EBL nanopatterning is achievable, even at low-energy e-beam (5 keV) and low doses, as it minimizes the proximity effect and enables precise 2.5D nanopatterning via grayscale lithography. Additionally, integrating nanophotonic structures into fluorescent material-containing silk allows for fluorescence amplification. Furthermore, this post-exposure cross-linking way indicates that the silk bioresist can maintain nanopatterned information stored in silk molecules in the amorphous state, utilizing for the secure storage of nanopatterned information as a security patch. Based on the fabrication technique, versatile biomaterial-based nanodevices for biomedical applications can be envisioned.

2.
Biomimetics (Basel) ; 9(6)2024 May 21.
Artigo em Inglês | MEDLINE | ID: mdl-38921187

RESUMO

In the complex and dynamic landscape of cyber threats, organizations require sophisticated strategies for managing Cybersecurity Operations Centers and deploying Security Information and Event Management systems. Our study enhances these strategies by integrating the precision of well-known biomimetic optimization algorithms-namely Particle Swarm Optimization, the Bat Algorithm, the Gray Wolf Optimizer, and the Orca Predator Algorithm-with the adaptability of Deep Q-Learning, a reinforcement learning technique that leverages deep neural networks to teach algorithms optimal actions through trial and error in complex environments. This hybrid methodology targets the efficient allocation and deployment of network intrusion detection sensors while balancing cost-effectiveness with essential network security imperatives. Comprehensive computational tests show that versions enhanced with Deep Q-Learning significantly outperform their native counterparts, especially in complex infrastructures. These results highlight the efficacy of integrating metaheuristics with reinforcement learning to tackle complex optimization challenges, underscoring Deep Q-Learning's potential to boost cybersecurity measures in rapidly evolving threat environments.

3.
Sensors (Basel) ; 23(13)2023 Jun 22.
Artigo em Inglês | MEDLINE | ID: mdl-37447678

RESUMO

The advancements and reliance on digital data necessitates dependence on information technology. The growing amount of digital data and their availability over the Internet have given rise to the problem of information security. With the increase in connectivity among devices and networks, maintaining the information security of an asset has now become essential for an organization. Intrusion detection systems (IDS) are widely used in networks for protection against different network attacks. Several machine-learning-based techniques have been used among researchers for the implementation of anomaly-based IDS (AIDS). In the past, the focus primarily remained on the improvement of the accuracy of the system. Efficiency with respect to time is an important aspect of an IDS, which most of the research has thus far somewhat overlooked. For this purpose, we propose a multi-layered filtration framework (MLFF) for feature reduction using a statistical approach. The proposed framework helps reduce the detection time without affecting the accuracy. We use the CIC-IDS2017 dataset for experiments. The proposed framework contains three filters and is connected in sequential order. The accuracy, precision, recall and F1 score are calculated against the selected machine learning models. In addition, the training time and the detection time are also calculated because these parameters are considered important in measuring the performance of a detection system. Generally, decision tree models, random forest methods, and artificial neural networks show better results in the detection of network attacks with minimum detection time.


Assuntos
Filtração , Tecnologia da Informação , Internet , Aprendizado de Máquina , Redes Neurais de Computação
4.
J Bus Psychol ; 37(1): 1-29, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-33564206

RESUMO

Cybersecurity is an ever-present problem for organizations, but organizational science has barely begun to enter the arena of cybersecurity research. As a result, the "human factor" in cybersecurity research is much less studied than its technological counterpart. The current manuscript serves as an introduction and invitation to cybersecurity research by organizational scientists. We define cybersecurity, provide definitions of key cybersecurity constructs relevant to employee behavior, illuminate the unique opportunities available to organizational scientists in the cybersecurity arena (e.g., publication venues that reach new audiences, novel sources of external funding), and provide overall conceptual frameworks of the antecedents of employees' cybersecurity behavior. In so doing, we emphasize both end-users of cybersecurity in organizations and employees focused specifically on cybersecurity work. We provide an expansive agenda for future organizational science research on cybersecurity-and we describe the benefits such research can provide not only to cybersecurity but also to basic research in organizational science itself. We end by providing a list of potential objections to the proposed research along with our responses to these objections. It is our hope that the current manuscript will catalyze research at the interface of organizational science and cybersecurity.

5.
Sensors (Basel) ; 17(4)2017 Apr 05.
Artigo em Inglês | MEDLINE | ID: mdl-28379192

RESUMO

Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA