Search query: theft
Categories: All Categories
13142 records searched, 13 records found
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published New anti-counterfeit technique packs two light-reactive images into one material (via sciencedaily.com) Original source
Growing concern about data theft and counterfeiting has inspired increasingly sophisticated security ...
Published New test to snare those lying about a person's identity - New Test to Snare Those Lying About a Person's Identity (via sciencedaily.com)
A new test could help police to determine when criminals or witnesses are lying about their knowledg...
Published Face off for best ID checkers - Face Off for Best ID Checkers (via sciencedaily.com)
The Glasgow Face Matching Test has been updated to find super-recognizers who can help prevent error...
Published Cybersecurity vulnerabilities of common seismological equipment - Cybersecurity Vulnerabilities of Common Seismological Equipment (via sciencedaily.com)
Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt...
Published Using quantum Parrondo’s random walks for encryption - Using Quantum Parrondo's Random Walks for Encryption (via sciencedaily.com)
SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol f...
Published Real or fake text? We can learn to spot the difference - Real or Fake Text? We Can Learn to Spot the Difference (via sciencedaily.com)
While apprehensions about employment and schools dominate headlines, the truth is that the effects o...
Published New AI model can help prevent damaging and costly data breaches - New AI Model Can Help Prevent Damaging and Costly Data Breaches (via sciencedaily.com)
Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for...
Published Scientific advance leads to a new tool in the fight against hackers - Scientific Advance Leads to a New Tool in the Fight Against Hackers (via sciencedaily.com)
A new form of security identification could soon see the light of day and help us protect our data f...
Published Just a game? Study shows no evidence that violent video games lead to real-life violence - Just a Game? Study Shows No Evidence That Violent Video Games Lead to Real-Life Violence (via sciencedaily.com)
As the latest Call of Duty video game is released in the UK today, and with Battlefield 2042 and a r...
Published Sniffing out your identity with breath biometrics - Sniffing Out Your Identity with Breath Biometrics (via sciencedaily.com)
Researchers have developed an artificial 'nose' that can identify individuals from their breath. Bui...
Published Many US adults worry about facial image data in healthcare settings - Many US Adults Worry About Facial Image Data in Healthcare Settings (via sciencedaily.com)
Uses of facial images and facial recognition technologies -- to unlock a phone or in airport securit...
Published High-security identification that cannot be counterfeited - High-Security Identification That Cannot Be Counterfeited (via sciencedaily.com)
Researcher have used the principles that underpin the whispering-gallery effect to create an unbeata...
Published A security technique to fool would-be cyber attackers - A Security Technique to Fool Would-Be Cyber Attackers (via sciencedaily.com)
Researchers developed a technique that effectively protects computer programs' secret information fr...