Results 261 to 270 of about 285,701 (294)
Some of the next articles are maybe not open access.
A Scheme for Protecting the Information Leakage Via Portable Devices
The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007), 2007Information leakage from corporate computer systems is a big social problem in terms of the protection of corporate assets and customers' privacy. Digital assets are usually brought out of companies with the portable devices such as USB memory sticks, PDAs, and laptop PCs.
openaire +1 more source
Obturation Techniques Allow Microbial Leakage Unless Protected
Journal of Prosthodontics, 2015AbstractPurposeTo evaluate the quality of the apical 5‐mm seal produced by different filling techniques using a bacterial leakage model.Materials and MethodsSixty‐five extracted single‐rooted human teeth were decoronated, prepared, and instrumented. Roots were randomly divided into three experimental groups (15 roots each) and control groups (10 roots ...
openaire +2 more sources
Automatic Full Gas Leakage Protection
International Journal of Scientific and Research Publications, 2023Bader Algahtani, Adnan Affandi
openaire +1 more source
A Study on the Protection of Technology Leakage of Startups
The Korean Career, Entrepreneurship & Business Association, 2021Hana Cho, Reeda HA, Hwansoo Lee
openaire +1 more source
Leakage Protection System Based on Zigbee Design
Applied Mechanics and Materials, 2012As a Zigbee wireless sensor technology, Its application to the grid. Analyze leakage protection system in relation to the past system of superior performance and favorable conditions, And its features and system design of a simple program to explain the analysis and application of specific measures.
openaire +1 more source
A Novel Fault Leakage Current Detection Method With Protection Deadzone Elimination
IEEE Transactions on Instrumentation and Measurement, 2021Kui Li, Jingyi Lin, Feng Niu
exaly
Data Leakage Threats and Protection in Split Learning: A Survey
Proceedings of the 2023 International Conference on Intelligent Computing and Its Emerging Applications, 2023Ngoc Duy Pham, Naveen Chilamkurti
openaire +1 more source
International Journal of Electrical Power and Energy Systems, 2023
Xiangjun Zeng, Kun Yu, Zewen Li
exaly
Xiangjun Zeng, Kun Yu, Zewen Li
exaly
Data Protection in Transit and at Rest with Leakage Detection
2019In service-oriented architecture, services can communicate and share data among themselves. This thesis presents a solution that allows detecting several types of data leakages made by authorized insiders to unauthorized services. My solution provides role-based and attribute-based access control for data so that each service can access only those data
openaire +1 more source

