Results 61 to 70 of about 79,557 (216)

Complementarity Endures: No Firewall for an Infalling Observer

open access: yes, 2012
We argue that the complementarity picture, as interpreted as a reference frame change represented in quantum gravitational Hilbert space, does not suffer from the "firewall paradox" recently discussed by Almheiri, Marolf, Polchinski, and Sully. A quantum
A Almheiri   +17 more
core   +1 more source

Shock wave propagation characteristics of aluminum‐containing explosive in corrugated steel‐lined tunnel

open access: yesDeep Underground Science and Engineering, EarlyView.
Aluminum‐enhanced afterburning renders AE explosives more hazardous than conventional ones. Corrugated steel linings reduce far‐field AE blast overpressure by ~50% through wave reflection and dissipation. The developed model accurately predicts peak pressure (<10% error) and arrival time (<3% error), supporting protective design.
Zhen Wang   +5 more
wiley   +1 more source

Firewalls: A Balance Between Security and Accesibility [PDF]

open access: yes, 2018
Access control lists and firewall rules are intended to prevent access to certain resources on a computer network while allowing access to other resources.
Ecker, Nathan
core   +1 more source

Digital Rights Activism in Multilevel Governance

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley   +1 more source

AUDITING AS PROTECTION AGAINST SYSTEM ERRORS [PDF]

open access: yesAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie, 2014
Auditing is an instrument that can be used to improve the security of any systems in our network. In case of a security breach or network penetration, the event recording log that we can find on different logl files helps us identify what has been ...
STEGĂROIU CARINA-ELENA
doaj  

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

A survey of firewall technology based on image content filtering

open access: yesTongxin xuebao, 2003
In this paper, status quo of firewall technology based on image content filtering is introduced. Typical firewall system architecture is given, and key techniques of the system are analyzed and discussed.
DONG Kai-kun   +2 more
doaj   +2 more sources

Complementarity Is Not Enough

open access: yes, 2012
The near-horizon field B of an old black hole is maximally entangled with the early Hawking radiation R, by unitarity of the S-matrix. But B must be maximally entangled with the black hole interior A, by the equivalence principle.
Bousso, Raphael
core   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Critical Success Factors and a Modus Operandi Framework for Managing Multi‐Actor Research Partnerships for Sustainable Food Systems

open access: yesSustainable Development, EarlyView.
ABSTRACT This paper investigates critical success factors for managing multi‐actor research partnerships for sustainable food systems along their lifecycle. Such partnerships coordinate both internal activities and manage externally funded projects. Drawing on evidence from case studies and workshops with diverse experts, the study identifies critical ...
Mechthild Donner   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy