Results 61 to 70 of about 79,557 (216)
Complementarity Endures: No Firewall for an Infalling Observer
We argue that the complementarity picture, as interpreted as a reference frame change represented in quantum gravitational Hilbert space, does not suffer from the "firewall paradox" recently discussed by Almheiri, Marolf, Polchinski, and Sully. A quantum
A Almheiri +17 more
core +1 more source
Aluminum‐enhanced afterburning renders AE explosives more hazardous than conventional ones. Corrugated steel linings reduce far‐field AE blast overpressure by ~50% through wave reflection and dissipation. The developed model accurately predicts peak pressure (<10% error) and arrival time (<3% error), supporting protective design.
Zhen Wang +5 more
wiley +1 more source
Firewalls: A Balance Between Security and Accesibility [PDF]
Access control lists and firewall rules are intended to prevent access to certain resources on a computer network while allowing access to other resources.
Ecker, Nathan
core +1 more source
Digital Rights Activism in Multilevel Governance
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley +1 more source
AUDITING AS PROTECTION AGAINST SYSTEM ERRORS [PDF]
Auditing is an instrument that can be used to improve the security of any systems in our network. In case of a security breach or network penetration, the event recording log that we can find on different logl files helps us identify what has been ...
STEGĂROIU CARINA-ELENA
doaj
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
A survey of firewall technology based on image content filtering
In this paper, status quo of firewall technology based on image content filtering is introduced. Typical firewall system architecture is given, and key techniques of the system are analyzed and discussed.
DONG Kai-kun +2 more
doaj +2 more sources
The near-horizon field B of an old black hole is maximally entangled with the early Hawking radiation R, by unitarity of the S-matrix. But B must be maximally entangled with the black hole interior A, by the equivalence principle.
Bousso, Raphael
core +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
ABSTRACT This paper investigates critical success factors for managing multi‐actor research partnerships for sustainable food systems along their lifecycle. Such partnerships coordinate both internal activities and manage externally funded projects. Drawing on evidence from case studies and workshops with diverse experts, the study identifies critical ...
Mechthild Donner +5 more
wiley +1 more source

