Results 11 to 20 of about 79,557 (216)
Enhanced mitochondrial activity reshapes a gut microbiota profile that delays NASH progression
Improved mitochondrial activity, due to the lack of methylation‐controlled J protein (MCJ), creates a specific microbiota signature that when transferred through cecal microbiota transplantation delays NASH progression by restoring the gut‐liver axis and enhancing hepatic fatty acid oxidation.
María Juárez‐Fernández +18 more
wiley +1 more source
Information protection systems in e-banking [PDF]
Because it is implemented in a network environment, electronic banking is subject to various security risks. Therefore, in order to safely use banking services electronically, it is necessary to identify potential threats through the analysis of network ...
Bakić Darko
doaj +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
SecSip: A Stateful Firewall for SIP-based Networks [PDF]
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core +5 more sources
Mechanism to prevent the abuse of IPv6 fragmentation in OpenFlow networks.
OpenFlow makes a network highly flexible and fast-evolving by separating control and data planes. The control plane thus becomes responsive to changes in topology and load balancing requirements.
Ayman Al-Ani +3 more
doaj +1 more source
A Unified Learning Approach for Malicious Domain Name Detection
The DNS firewall plays an important role in network security. It is based on a list of known malicious domain names, and, based on these lists, the firewall blocks communication with these domain names.
Atif Ali Wagan +7 more
doaj +1 more source
Performance evaluation of multi-cloud compared to the single-cloud under varying firewall conditions
The main purpose of this paper is to evaluate the network performances of multi-cloud compared to the single cloud under several firewall scenarios. Riverbed Modeler is used as the simulation tool in this project, and several projects are formed in this ...
Mahbuba Yeasmin +3 more
doaj +1 more source
A new approach to deploy a self-adaptive distributed firewall
■■■ Distributed firewall systems emerged with the proposal of protecting individual hosts against attacks originating from inside the network. In these systems, firewall rules are centrally created, then distributed and enforced on all servers that ...
Edmilson P. da Costa Júnior +3 more
doaj +1 more source
Firewall Best Practices for Securing Smart Healthcare Environment: A Review
Smart healthcare environments are growing at a rapid pace due to the services and benefits offered to healthcare practitioners and to patients. At the same time, smart healthcare environments are becoming increasingly complex environments where a ...
Raja Waseem Anwar +2 more
doaj +1 more source
Decoupled data and control planes in Software Defined Networks (SDN) allow them to handle an increasing number of threats by limiting harmful network links at the switching stage.
Senthil Prabakaran +6 more
doaj +1 more source

