Results 251 to 260 of about 283,565 (299)
Some of the next articles are maybe not open access.

Voltage-operated earth-leakage protection

Journal of the Institution of Electrical Engineers - Part II: Power Engineering, 1941
The paper “Voltage-operated earth-leakage protection” by T. C. Gilbert, deals with the problem of protection of low-voltage distribution systems from the standpoint of practical experience rather than from a purely theoretical basis, particularly for secondary systems on customers' premises.
openaire   +2 more sources

Protection Profile for Data Leakage Protection System

2011
Most of the biggest financial or insurance companies in the world that deal with critical client information are now considering introducing a Data Leakage Protection(DLP) system in order to reduce the risk of data loss. However, there is no standard for the introduction of a DLP system, which leads to companies still having the problem of information ...
Hyun-Jung Lee, Dongho Won
openaire   +1 more source

Electromagnetic Information Leakage and Protection

2019
Computer as information processing facility is pervasive in modern society, and information processing includes calculation, storage, transmission, exchange and so on. Components of computer play important roles during such processes; in the meantime, electromagnetic security issue exists.
Taikang Liu, Yongmei Li
openaire   +1 more source

Obturation Techniques Allow Microbial Leakage Unless Protected

Journal of Prosthodontics, 2015
AbstractPurposeTo evaluate the quality of the apical 5‐mm seal produced by different filling techniques using a bacterial leakage model.Materials and MethodsSixty‐five extracted single‐rooted human teeth were decoronated, prepared, and instrumented. Roots were randomly divided into three experimental groups (15 roots each) and control groups (10 roots ...
openaire   +2 more sources

The electromagnetic leakage and protection for computer

Proceedings of International Symposium on Electromagnetic Compatibility ELMAGC-97, 1997
This paper researches a computer's electromagnetic leakage and information leakage path, protection measures, computer CRT ray and synchronous signal radiation field amplitude, and leakage information restoration. It presents two new computer leakage measure techniques.
null Lu Ling   +2 more
openaire   +1 more source

Leakage Assessment of Protective Gas Masks

1988
Abstract : This peer group review meeting of respiratory quantitative fit test (QNFT) methods intended to consider (1) the advantages and disadvantages of presently used fit test methods, (2) the applicability of present methods to field effectiveness measurements, (3) improved methods for determining leakage of respirators, and (4) other research ...
Frank Shanty   +2 more
openaire   +1 more source

Protection Material of Electromagnetic Information Leakage

2019
Electromagnetic wave is a major way of electromagnetism energy transmission, which is radiated to outside when the high-frequency circuit operates. Since the electromagnetic waves radiated from the device are strongly related to the information being processed, they may cause information leakage and threat to information security.
Taikang Liu, Yongmei Li
openaire   +1 more source

Schutz der Unternehmensdaten — Data Leakage Protection (DLP)

HMD Praxis der Wirtschaftsinformatik, 2011
Wenn ein Unternehmen den Zugang zu seinen Daten und den Umgang der Mitarbeiter mit diesen Daten nicht schutzt und entsprechend regelt, besteht die Gefahr, dass diese Daten irgendwann gestohlen werden oder unautorisiert das Unternehmen verlassen. Mit Data Leakage Protection (DLP) werden Systeme am Markt angeboten, die den unautorisierten Abfluss von ...
Michael Föck, Hans-Peter Fröschle
openaire   +1 more source

Leakage protection device based on smart home

2020 International Conference on Virtual Reality and Intelligent Systems (ICVRIS), 2020
With the development of science and technology and the improvement of living standards, the concept of smart home system has begun to move towards the masses, and home intelligence will definitely be a hot topic in the field of automatic control for a long time to come.
Hongwen Cai   +3 more
openaire   +1 more source

Bypassing information leakage protection with trusted applications

Computers & Security, 2012
Insider threats are an increasing concern for most modern organizations. Information leakage is one of the most important insider threats, particularly according to its potential financial impact. Data Leakage Protection (DLP) systems have been developed to tackle this issue and they constitute the main solution to protect information systems against ...
Blasco Alis, Jorge   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy