Results 81 to 90 of about 1,717,630 (292)
Directed Security Policies: A Stateful Network Implementation
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this
Carle, Georg +2 more
core +2 more sources
Synchrotron Radiation for Quantum Technology
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader +10 more
wiley +1 more source
Application-centric congestion control
Modern networked applications typically establish multiple connections to one or more servers to ensure that the virtual objects with which the user interacts are kept up to date.
Danny De Vleeschauwer +3 more
doaj +1 more source
A feature selection method of network traffic based on statistic and ranking strategy
It is required to select the best features from so many ones in order to avoid the high complexity of the model, the low classification accuracy and efficiency caused by redundant and irrelevant features, if network traffic classification is obtained by ...
Liu Jiwei, Zhao Yuexian, Zhao Yang
doaj +1 more source
Securing the Data in Clouds with Hyperelliptic Curve Cryptography
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay +3 more
core +1 more source
Experimental and Theoretical Confirmation of Covalent Bonding in α‐Pu
From a combination of Reverse Monte Carlo dynamic rigid body fitting to the pair distribution functional and novel density functional approaches, the existence of covalent bonding is confirmed in α‐plutonium alongside other bonding types (i.e. mixed bonding schemes).
Alexander R. Muñoz +10 more
wiley +1 more source
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida +16 more
wiley +1 more source
Trust Modeling in Wireless Sensor Networks: State of the Art
Wireless sensor networks (WSNs) is the backbone of the new generation of internet of things (IoT). WSNs are growing rapidly and security threats are increasingly growing as well. Trust computing plays a crucial role in WSN security modeling.
Mohammed Mahdi AlQahatani +1 more
doaj +1 more source
Biopolymers are sustainable, biodegradable alternatives to petroleum‐based plastics for food packaging. Its adoption is often limited by poor mechanical strength, barrier properties, and improved thermal stability through the incorporation of nanofillers.
Himakshi Baishya +2 more
wiley +1 more source
With the significant increase in cyber-attacks and attempts to gain unauthorised access to systems and information, Network Intrusion-Detection Systems (NIDSs) have become essential detection tools.
Joaquín Gaspar Medina-Arco +3 more
doaj +1 more source

