Results 31 to 40 of about 199,972 (293)
Dynamic heterogeneous scheduling method based on Stackelberg game model in container cloud
Container technology promotes the rapid development of cloud computing with its flexible and efficient features, but it also introduces security threats such as co-resident attacks, escape attacks, and common mode attacks.In response to these security ...
Wei ZENG +3 more
doaj +3 more sources
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano +5 more
core +1 more source
Using portfolio optimisation to calculate the efficient relationship between maritime port security residual risk and security investment [PDF]
The research employs an adaptive cross-disciplinary research strategy in an industrial example to address container port facilities’ inability to assess whether their security systems are efficient.
Menachof, David, Talas, Risto
core +2 more sources
ABSTRACT Purpose Chemoimmunotherapy with irinotecan, temozolomide, and dinutuximab (I/T/DIN) has emerged as first‐line therapy for relapsed/refractory (r/r) high‐risk neuroblastoma (HRNB) in North America. Topotecan and cyclophosphamide (T/C) are often used in combination with dinutuximab in the setting of lack of response, progression, or incomplete ...
Benjamin J. Lerman +17 more
wiley +1 more source
Research on Standard System Construction of Bulk Grain Container Transportation in China
Container transportation has become an important part of the new modern grain logistics system in China, which is convenient, efficient and flexible. Based on the analysis of domestic and foreign bulk grain container transportation and standards, this ...
WANG Xiao-meng +6 more
doaj +1 more source
Scanning of Vehicles for Nuclear Materials
Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to ...
Katz, J. I.
core +1 more source
Container network functions: bringing NFV to the network edge [PDF]
In order to cope with the increasing network utilization driven by new mobile clients, and to satisfy demand for new network services and performance guarantees, telecommunication service providers are exploiting virtualization over their network by ...
Cziva, Richard, Pezaros, Dimitrios P.
core +1 more source
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman +2 more
wiley +1 more source
Intrusion Tolerance Scheduling Algorithm for Microservice Workflow Based on Deep Reinforcement Learning [PDF]
With the rapid development of microservices and container technology,applications executed in the cloud can be completed by multiple microservices with dependencies.However,microservices for container clouds face many security threats due to shared ...
LI Yuanbo, HU Hongchao, YANG Xiaohan, GUO Wei, LIU Wenyan
doaj +1 more source
Transit: An analysis of networked criminal groups and criminal opportunities at transit ports [PDF]
Like the path of many contraband commodities, trafficked cultural objects cross countless legal borders and intersect with the legitimate market world at a number of critical transit junctures, which supports the concept of a single “grey” market.
Casey, Ryan Nicole
core +1 more source

