Results 261 to 270 of about 285,701 (294)
Some of the next articles are maybe not open access.

A Scheme for Protecting the Information Leakage Via Portable Devices

The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007), 2007
Information leakage from corporate computer systems is a big social problem in terms of the protection of corporate assets and customers' privacy. Digital assets are usually brought out of companies with the portable devices such as USB memory sticks, PDAs, and laptop PCs.
openaire   +1 more source

Obturation Techniques Allow Microbial Leakage Unless Protected

Journal of Prosthodontics, 2015
AbstractPurposeTo evaluate the quality of the apical 5‐mm seal produced by different filling techniques using a bacterial leakage model.Materials and MethodsSixty‐five extracted single‐rooted human teeth were decoronated, prepared, and instrumented. Roots were randomly divided into three experimental groups (15 roots each) and control groups (10 roots ...
openaire   +2 more sources

Automatic Full Gas Leakage Protection

International Journal of Scientific and Research Publications, 2023
Bader Algahtani, Adnan Affandi
openaire   +1 more source

A Study on the Protection of Technology Leakage of Startups

The Korean Career, Entrepreneurship & Business Association, 2021
Hana Cho, Reeda HA, Hwansoo Lee
openaire   +1 more source

Leakage Protection System Based on Zigbee Design

Applied Mechanics and Materials, 2012
As a Zigbee wireless sensor technology, Its application to the grid. Analyze leakage protection system in relation to the past system of superior performance and favorable conditions, And its features and system design of a simple program to explain the analysis and application of specific measures.
openaire   +1 more source

A Novel Fault Leakage Current Detection Method With Protection Deadzone Elimination

IEEE Transactions on Instrumentation and Measurement, 2021
Kui Li, Jingyi Lin, Feng Niu
exaly  

View analysis of personal information leakage and privacy protection in big data era—based on Q method

Aslib Journal of Information Management, 2022
Lei Huang, Jingyi Zhou, Jiecong Lin
exaly  

Data Leakage Threats and Protection in Split Learning: A Survey

Proceedings of the 2023 International Conference on Intelligent Computing and Its Emerging Applications, 2023
Ngoc Duy Pham, Naveen Chilamkurti
openaire   +1 more source

A leakage protection method for low-voltage power supply systems based on flexible regulation of the neutral point voltage

International Journal of Electrical Power and Energy Systems, 2023
Xiangjun Zeng, Kun Yu, Zewen Li
exaly  

Data Protection in Transit and at Rest with Leakage Detection

2019
In service-oriented architecture, services can communicate and share data among themselves. This thesis presents a solution that allows detecting several types of data leakages made by authorized insiders to unauthorized services. My solution provides role-based and attribute-based access control for data so that each service can access only those data
openaire   +1 more source

Home - About - Disclaimer - Privacy