Results 81 to 90 of about 79,557 (216)
An Integrated Firewall System Model In A Multiclient-Server Environment [PDF]
As the Internet grows, and the use of computers is getting more common, the need to secure networks and protect them from the Internet, while still being able to access it, is increasing.
Al-Kazwini, Hussein A. Taqi
core
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
STREETS AS STAGES: Traffic Enforcement and the Competition for Cultural Growth in China
ABSTRACT In keeping with China’s desire to build soft power to parallel its economic growth, the policing of city streets has moved to the forefront as a mechanism for moral regulation and improving urban prestige. Under pressure to civilize their citizenry, many Chinese cities have become entrepreneurial cities within a type of cultural growth ...
Gregory Fayard
wiley +1 more source
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks, firewalls are utilized since they restrict network access while letting ...
Ernst L. Leiss, Jianyu You
doaj +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley +1 more source
Every year, more and more electronic devices are used in households, which certainly leads to an increase in the total number of communications between devices.
Henrich C. Pöhls +3 more
doaj +1 more source
Artificial Intelligence Revolution: The Need for a Regulatory and Governance Framework in Dentistry
Journal of Dental Education, EarlyView.
Ehsan Jozaghi
wiley +1 more source
Abstract The rise of social media in the digital era poses unprecedented challenges to authoritarian regimes that aim to influence public attitudes and behaviors. To address these challenges, we argue that authoritarian regimes have adopted a decentralized approach to produce and disseminate propaganda on social media.
Yingdan Lu +3 more
wiley +1 more source
An Effective Algorithm for Collision Resolution in Security Policy Rules
A firewall is the main classic tool for monitoring and managing the network traffic on a local network. Its task is to compare the network traffic passing through it with the established security rules.
Sergey V. Morzhov, Valeriy A. Sokolov
doaj +1 more source

