Results 31 to 40 of about 79,557 (216)

HSViz-II: Octet Layered Hierarchy Simplified Visualizations for Distributed Firewall Policy Analysis

open access: yesIEEE Access
Enterprises typically install firewalls at communication points to their internal networks with the primary objective of protecting their core assets from external cyber attackers. This ensures unauthorized access is controlled and prevented.
Hyunjung Lee   +3 more
doaj   +1 more source

Naked singularity, firewall, and Hawking radiation

open access: yes, 2017
Spacetime singularity has always been of interest since the proof of the Penrose-Hawking singularity theorem. Naked singularity naturally emerges from reasonable initial conditions in the collapsing process.
Zhang, Hongsheng
core   +1 more source

Firewalls in AdS/CFT

open access: yes, 2014
Several recent papers argue against firewalls by relaxing the requirement for locality outside the stretched horizon. In the firewall argument, locality essentially serves the purpose of ensuring that the degrees of freedom required for infall are those ...
Avery, Steven G., Chowdhury, Borun D.
core   +1 more source

IP-Telefonie und Firewalls, Probleme und Lösungen [PDF]

open access: yes, 2001
Im Rahmen einer umfassenden Security-Policy stellen Firewall -Systeme eine wichtige Maßnahme zum Schutz eines privaten Netzes vor Angriffen aus dem Internet dar.
Ackermann, Ralf   +2 more
core   +1 more source

Penyusunan Panduan Pengelolaan Keamanan Informasi Untuk Firewall Configuration Berdasarkan Kerangka Kerja PCI DSS v.3.1 dan COBIT 5

open access: yesJournal of Information Systems Engineering and Business Intelligence, 2016
Abstrak — Keamanan informasi merupakan bagian dari sebuah sistem yang sangat penting untuk dijaga validitas dan integritas data serta menjamin ketersediaan layanan bagi penggunaannya.
Bagus Puji Santoso   +2 more
doaj   +1 more source

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

Software Define Wide Area Network (SDWAN) network optimization analysis on radiolink-fiber optic access media migration [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
The development of technology in radiolink networks has grown rapidly and is suitable to be implemented on wide coverage area networks, but weather and physical environment factors greatly affect signal conditions.
Nugraha Beny   +5 more
doaj   +1 more source

Black hole complementarity and firewall in two dimensions

open access: yes, 2013
In connection with black hole complementarity, we study the possibility of the duplication of information in the RST model which is an exactly soluble quantized model in two dimensions.
Kim, Wontae   +2 more
core   +1 more source

Ethical Precision in Nanoscale Brain Interfacing

open access: yesAdvanced Science, EarlyView.
As brain interfaces approach the nanoscale, precision no longer only measures—it knows, predicts, and potentially reshapes the mind. This work argues that traditional ethics fails under such conditions and proposes a shift toward continuous, operation‐based governance using the recovery–discovery framework to track, constrain, and responsibly steer ...
Guilherme Wood
wiley   +1 more source

Black holes without firewalls

open access: yes, 2013
The postulates of black hole complementarity do not imply a firewall for infalling observers at a black hole horizon. The dynamics of the stretched horizon, that scrambles and re-emits information, determines whether infalling observers experience ...
Larjo, Klaus   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy