Results 71 to 80 of about 79,557 (216)
Enabling the Internet White Pages Service -- the Directory Guardian [PDF]
The Internet White Pages Service (IWPS) has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to gain access to either their Intranet or their directory database.
Chadwick, David W., Young, Andrew J.
core
Can we observe fuzzballs or firewalls?
In the fuzzball paradigm the information paradox is resolved because the black hole is replaced by an object with no horizon. One may therefore ask if observations can distinguish a traditional hole from a fuzzball.
Guo, Bin +2 more
core +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Implementasi Firewall Mikrotik dalam Pembatasan Akses Situs Terlarang di RT/RW Net
The increasing use of the Internet in RT/RW Net environments has brought both positive and negative impacts. One issue is the unrestricted access to inappropriate content, especially among students, such as online games, pornography, and gambling ...
Hanggoro Aji Al Kautsar, Ricki Sastra
doaj +1 more source
EXAMINATION OF MODERN CONCEPTS FOR FIREWALLS AND COLLABORATIVE INTRUSION DETECTION
Background. Modern firewall systems are compared to classical concepts. The filtering rules are analyzed on the examples of the leading solutions (presented by Gartner Inc.).
Andriy Luntovskyy, Mykhailo Klymash
doaj +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
Network connectivity can be both a blessing and a curse. On the one hand, network connectivity can enable users to share files, exchange e-mail, and pool physical resources.
Radu Constantinescu
core
Firewall management with FireWall synthesizer
Firewalls are notoriously hard to configure and maintain. Policies are written in low-level, system-specific languages where rules are inspected and enforced along non-trivial control flow paths. Moreover, firewalls are tightly related to Network Address Translation (NAT) since filters need to be specified taking into account the possible translations ...
Chiara Bodei +5 more
openaire +2 more sources
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
The evolution of the pandemic has led to a change in public health and data management in the infectious disease surveillance network monitored by the county public health directorates.
Călin MUNTEAN +3 more
doaj

