Results 251 to 260 of about 283,565 (299)
Some of the next articles are maybe not open access.
Voltage-operated earth-leakage protection
Journal of the Institution of Electrical Engineers - Part II: Power Engineering, 1941The paper “Voltage-operated earth-leakage protection” by T. C. Gilbert, deals with the problem of protection of low-voltage distribution systems from the standpoint of practical experience rather than from a purely theoretical basis, particularly for secondary systems on customers' premises.
openaire +2 more sources
Protection Profile for Data Leakage Protection System
2011Most of the biggest financial or insurance companies in the world that deal with critical client information are now considering introducing a Data Leakage Protection(DLP) system in order to reduce the risk of data loss. However, there is no standard for the introduction of a DLP system, which leads to companies still having the problem of information ...
Hyun-Jung Lee, Dongho Won
openaire +1 more source
Electromagnetic Information Leakage and Protection
2019Computer as information processing facility is pervasive in modern society, and information processing includes calculation, storage, transmission, exchange and so on. Components of computer play important roles during such processes; in the meantime, electromagnetic security issue exists.
Taikang Liu, Yongmei Li
openaire +1 more source
Obturation Techniques Allow Microbial Leakage Unless Protected
Journal of Prosthodontics, 2015AbstractPurposeTo evaluate the quality of the apical 5‐mm seal produced by different filling techniques using a bacterial leakage model.Materials and MethodsSixty‐five extracted single‐rooted human teeth were decoronated, prepared, and instrumented. Roots were randomly divided into three experimental groups (15 roots each) and control groups (10 roots ...
openaire +2 more sources
The electromagnetic leakage and protection for computer
Proceedings of International Symposium on Electromagnetic Compatibility ELMAGC-97, 1997This paper researches a computer's electromagnetic leakage and information leakage path, protection measures, computer CRT ray and synchronous signal radiation field amplitude, and leakage information restoration. It presents two new computer leakage measure techniques.
null Lu Ling +2 more
openaire +1 more source
Leakage Assessment of Protective Gas Masks
1988Abstract : This peer group review meeting of respiratory quantitative fit test (QNFT) methods intended to consider (1) the advantages and disadvantages of presently used fit test methods, (2) the applicability of present methods to field effectiveness measurements, (3) improved methods for determining leakage of respirators, and (4) other research ...
Frank Shanty +2 more
openaire +1 more source
Protection Material of Electromagnetic Information Leakage
2019Electromagnetic wave is a major way of electromagnetism energy transmission, which is radiated to outside when the high-frequency circuit operates. Since the electromagnetic waves radiated from the device are strongly related to the information being processed, they may cause information leakage and threat to information security.
Taikang Liu, Yongmei Li
openaire +1 more source
Schutz der Unternehmensdaten — Data Leakage Protection (DLP)
HMD Praxis der Wirtschaftsinformatik, 2011Wenn ein Unternehmen den Zugang zu seinen Daten und den Umgang der Mitarbeiter mit diesen Daten nicht schutzt und entsprechend regelt, besteht die Gefahr, dass diese Daten irgendwann gestohlen werden oder unautorisiert das Unternehmen verlassen. Mit Data Leakage Protection (DLP) werden Systeme am Markt angeboten, die den unautorisierten Abfluss von ...
Michael Föck, Hans-Peter Fröschle
openaire +1 more source
Leakage protection device based on smart home
2020 International Conference on Virtual Reality and Intelligent Systems (ICVRIS), 2020With the development of science and technology and the improvement of living standards, the concept of smart home system has begun to move towards the masses, and home intelligence will definitely be a hot topic in the field of automatic control for a long time to come.
Hongwen Cai +3 more
openaire +1 more source
Bypassing information leakage protection with trusted applications
Computers & Security, 2012Insider threats are an increasing concern for most modern organizations. Information leakage is one of the most important insider threats, particularly according to its potential financial impact. Data Leakage Protection (DLP) systems have been developed to tackle this issue and they constitute the main solution to protect information systems against ...
Blasco Alis, Jorge +3 more
openaire +1 more source

