Search query: cyber
Categories: All Categories
13142 records searched, 27 records found, top 20 matches displayed
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published Interactive cyber-physical human: Generating contact-rich whole-body motions - Interactive Cyber-Physical Human: Generating Contact-Rich Whole-Body Motions (via sciencedaily.com)
Performing human-like motions that involve multiple contacts is challenging for robots. In this rega...
Published Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data (via sciencedaily.com)
Researchers have shown that a component of modern computer processors that enables different areas o...
Published Researchers unveil Internet of Things security feature - Researchers Unveil Internet of Things Security Feature (via sciencedaily.com) Original source
Integrated circuit designers have developed a new approach for creating secure keys and IDs on Inter...
Published New cyber algorithm shuts down malicious robotic attack (via sciencedaily.com) Original source
Researchers have designed an algorithm that can intercept a man-in-the-middle (MitM) cyberattack on...
Published New cyber software can verify how much knowledge AI really knows - New Cyber Software Can Verify How Much Knowledge AI Really Knows (via sciencedaily.com) Original source
With a growing interest in generative artificial intelligence (AI) systems worldwide, researchers ha...
Published Cyber-physical heating system may protect apple blossoms in orchards (via sciencedaily.com) Original source
Spring frosts can have devastating effects on apple production, and a warming climate may be causing...
Published Scientists put forth a smarter way to protect a smarter grid (via sciencedaily.com) Original source
Scientists have put forth a new approach to protect the electric grid, creating a tool that sorts an...
Published A security technique to fool would-be cyber attackers - A Security Technique to Fool Would-Be Cyber Attackers (via sciencedaily.com)
Researchers developed a technique that effectively protects computer programs' secret information fr...
Published Misinformation and irresponsible AI -- experts forecast how technology may shape our near future (via sciencedaily.com) Original source
From misinformation and invisible cyber attacks, to irresponsible AI that could cause events involvi ...
Published Agriculture tech use opens possibility of digital havoc - Agriculture Tech Use Opens Possibility of Digital Havoc (via sciencedaily.com)
Wide-ranging use of smart technologies is raising global agricultural production but international r...
Published Cybersecurity vulnerabilities of common seismological equipment - Cybersecurity Vulnerabilities of Common Seismological Equipment (via sciencedaily.com)
Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt...
Published Impenetrable optical OTP security platform - Impenetrable Optical OTP Security Platform: The Future of Data Protection (via sciencedaily.com)
An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible...
Published Double locked: Polymer hydrogels secure confidential information - Double Locked: Polymer Hydrogels Secure Confidential Information (via sciencedaily.com)
The development of highly secure but simple and inexpensive encryption technology for the prevention...
Published Using quantum Parrondo’s random walks for encryption - Using Quantum Parrondo's Random Walks for Encryption (via sciencedaily.com)
SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol f...
Published Algorithms improve how we protect our data - Algorithms Improve How We Protect Our Data (via sciencedaily.com)
Scientists have developed algorithms that more efficiently measure how difficult it would be for an...
Published How can the metaverse improve public health? - How the Metaverse Can Revolutionize Public Health (via sciencedaily.com)
The metaverse is a technological revolution in the field of virtual reality, with potential benefits...
Published Revolutionary quantum breakthrough paves way for safer online communication - Revolutionary Quantum Breakthrough Paves Way for Safer Online Communication (via sciencedaily.com)
The world is one step closer to having a totally secure internet and an answer to the growing threat...
Published Researchers discover that privacy-preserving tools leave private data anything but - Researchers Discover That Privacy-Preserving Tools Leave Private Data Anything But (via sciencedaily.com)
Researchers explored whether private data could still be recovered from images that had been 'saniti...
Published Computer scientists discover new vulnerability affecting computers globally - Computer Scientists Discover New Vulnerability Affecting Computers Globally (via sciencedaily.com)
A team o computer science researchers has uncovered a line of attack that breaks all Spectre defense...
Published Graphene key for novel hardware security - Graphene Key for Novel Hardware Security (via sciencedaily.com)
As more private data is stored and shared digitally, researchers are exploring new ways to protect d...