Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Andreas Walz"'
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 13, Iss 2, p 26 (2024)
Driven by the Industry 4.0 paradigm and the resulting demand for connectivity in industrial networking, there is a convergence of formerly isolated operational technology and information technology networks. This convergence leads to attack surfaces
Externí odkaz:
https://doaj.org/article/db799054fcd745a2bbd677ab3ec01535
Autor:
Julie M Miwa, Andreas Walz
Publikováno v:
PLoS ONE, Vol 7, Iss 11, p e43302 (2012)
The cholinergic system is a neuromodulatory neurotransmitter system involved in a variety of brain processes, including learning and memory, attention, and motor processes, among others. The influence of nicotinic acetylcholine receptors of the choli
Externí odkaz:
https://doaj.org/article/7d5c246be9ba46a8a55289842d748016
Publikováno v:
PLoS ONE, Vol 3, Iss 11, p e3816 (2008)
Stereotypical connections between olfactory sensory neuron axons and mitral cell dendrites in the olfactory bulb establish the first synaptic relay for olfactory perception. While mechanisms of olfactory sensory axon targeting are reported, molecular
Externí odkaz:
https://doaj.org/article/79277e681aa44ef09a4d611f78a110c4
Publikováno v:
IFAC-PapersOnLine. 55:266-271
Autor:
Dennis Meier, Benedikt Schoof, Jinhua Wang, Xuesong Li, Andreas Walz, Annette Huettig, Hartmut Schlichting, Frédéric Rosu, Valérie Gabelica, Victor Maurizot, Joachim Reichert, Anthoula C. Papageorgiou, Ivan Huc, Johannes V. Barth
Publikováno v:
Chemical Communications. 58:8938-8941
Aromatic foldamers are promising for applications such as molecular recognition and molecular machinery. For many of these, defect free, 2D-crystaline monolayers are needed. To this end, submonolayers were prepared in ultra-high vacuum (UHV) on Ag(11
Autor:
Axel Sikora, Andreas Walz
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 17:278-291
The Transport Layer Security (TLS) protocol is one of the most widely used security protocols on the internet. Yet do implementations of TLS keep on suffering from bugs and security vulnerabilities. In large part is this due to the protocol's complex
Publikováno v:
2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
Publikováno v:
2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ).
Publikováno v:
WFCS
Cryptographic protection of messages requires frequent updates of the symmetric cipher key used for encryption and decryption, respectively. Protocols of legacy IT security, like TLS, SSH, or MACsec implement rekeying under the assumption that, first
Publikováno v:
ChemRxiv
The prototype of a highly versatile and efficient preparative mass spectrometry system used for the deposition of molecules in ultra-high vacuum (UHV) is presented, along with encouraging performance data obtained on four model species which are ther