Results 11 to 20 of about 79,557 (216)

Enhanced mitochondrial activity reshapes a gut microbiota profile that delays NASH progression

open access: yesHepatology, EarlyView., 2022
Improved mitochondrial activity, due to the lack of methylation‐controlled J protein (MCJ), creates a specific microbiota signature that when transferred through cecal microbiota transplantation delays NASH progression by restoring the gut‐liver axis and enhancing hepatic fatty acid oxidation.
María Juárez‐Fernández   +18 more
wiley   +1 more source

Information protection systems in e-banking [PDF]

open access: yesBankarstvo, 2021
Because it is implemented in a network environment, electronic banking is subject to various security risks. Therefore, in order to safely use banking services electronically, it is necessary to identify potential threats through the analysis of network ...
Bakić Darko
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

SecSip: A Stateful Firewall for SIP-based Networks [PDF]

open access: yes, 2009
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core   +5 more sources

Mechanism to prevent the abuse of IPv6 fragmentation in OpenFlow networks.

open access: yesPLoS ONE, 2020
OpenFlow makes a network highly flexible and fast-evolving by separating control and data planes. The control plane thus becomes responsive to changes in topology and load balancing requirements.
Ayman Al-Ani   +3 more
doaj   +1 more source

A Unified Learning Approach for Malicious Domain Name Detection

open access: yesAxioms, 2023
The DNS firewall plays an important role in network security. It is based on a list of known malicious domain names, and, based on these lists, the firewall blocks communication with these domain names.
Atif Ali Wagan   +7 more
doaj   +1 more source

Performance evaluation of multi-cloud compared to the single-cloud under varying firewall conditions

open access: yesCogent Engineering, 2018
The main purpose of this paper is to evaluate the network performances of multi-cloud compared to the single cloud under several firewall scenarios. Riverbed Modeler is used as the simulation tool in this project, and several projects are formed in this ...
Mahbuba Yeasmin   +3 more
doaj   +1 more source

A new approach to deploy a self-adaptive distributed firewall

open access: yesJournal of Internet Services and Applications, 2018
■■■ Distributed firewall systems emerged with the proposal of protecting individual hosts against attacks originating from inside the network. In these systems, firewall rules are centrally created, then distributed and enforced on all servers that ...
Edmilson P. da Costa Júnior   +3 more
doaj   +1 more source

Firewall Best Practices for Securing Smart Healthcare Environment: A Review

open access: yesApplied Sciences, 2021
Smart healthcare environments are growing at a rapid pace due to the services and benefits offered to healthcare practitioners and to patients. At the same time, smart healthcare environments are becoming increasingly complex environments where a ...
Raja Waseem Anwar   +2 more
doaj   +1 more source

Predicting Attack Pattern via Machine Learning by Exploiting Stateful Firewall as Virtual Network Function in an SDN Network

open access: yesSensors, 2022
Decoupled data and control planes in Software Defined Networks (SDN) allow them to handle an increasing number of threats by limiting harmful network links at the switching stage.
Senthil Prabakaran   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy