Search query: cyber

Categories: All Categories


13142 records searched, 27 records found, 20 matches displayed

< Previous 20 articles


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Computer Science: Encryption Engineering: Biometric
Published

Radio waves for the detection of hardware tampering - Radio Waves for the Detection of Hardware Tampering      (via sciencedaily.com) 

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and on...

Computer Science: Encryption
Published

IT security: Computer attacks with laser light - IT Security: Protecting Against Computer Attacks with Laser Light      (via sciencedaily.com) 

Computer systems that are physically isolated from the outside world (air-gapped) can still be attac...

Computer Science: Encryption
Published

A nanoantenna for long-distance, ultra-secure communication - A Nanoantenna for Long-Distance, Ultra-Secure Communication      (via sciencedaily.com) 

Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approac...