Results 81 to 90 of about 79,557 (216)

An Integrated Firewall System Model In A Multiclient-Server Environment [PDF]

open access: yes, 2005
As the Internet grows, and the use of computers is getting more common, the need to secure networks and protect them from the Internet, while still being able to access it, is increasing.
Al-Kazwini, Hussein A. Taqi
core  

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

STREETS AS STAGES: Traffic Enforcement and the Competition for Cultural Growth in China

open access: yesInternational Journal of Urban and Regional Research, EarlyView.
ABSTRACT In keeping with China’s desire to build soft power to parallel its economic growth, the policing of city streets has moved to the forefront as a mechanism for moral regulation and improving urban prestige. Under pressure to civilize their citizenry, many Chinese cities have become entrepreneurial cities within a type of cultural growth ...
Gregory Fayard
wiley   +1 more source

Firewall Monitoring

open access: yesCLEI Electronic Journal, 1998
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks, firewalls are utilized since they restrict network access while letting ...
Ernst L. Leiss, Jianyu You
doaj   +1 more source

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley   +1 more source

Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT—An In-Depth STRIDE and LINDDUN Analysis of Smart Homes

open access: yesFuture Internet
Every year, more and more electronic devices are used in households, which certainly leads to an increase in the total number of communications between devices.
Henrich C. Pöhls   +3 more
doaj   +1 more source

Decentralized propaganda in the era of digital media: The massive presence of the Chinese state on Douyin

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract The rise of social media in the digital era poses unprecedented challenges to authoritarian regimes that aim to influence public attitudes and behaviors. To address these challenges, we argue that authoritarian regimes have adopted a decentralized approach to produce and disseminate propaganda on social media.
Yingdan Lu   +3 more
wiley   +1 more source

An Effective Algorithm for Collision Resolution in Security Policy Rules

open access: yesМоделирование и анализ информационных систем, 2019
A firewall is the main classic tool for monitoring and managing the network traffic on a local network. Its task is to compare the network traffic passing through it with the established security rules.
Sergey V. Morzhov, Valeriy A. Sokolov
doaj   +1 more source

Home - About - Disclaimer - Privacy