Results 81 to 90 of about 1,717,630 (292)

Directed Security Policies: A Stateful Network Implementation

open access: yes, 2014
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this
Carle, Georg   +2 more
core   +2 more sources

Synchrotron Radiation for Quantum Technology

open access: yesAdvanced Functional Materials, EarlyView.
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader   +10 more
wiley   +1 more source

Application-centric congestion control

open access: yesEURASIP Journal on Wireless Communications and Networking
Modern networked applications typically establish multiple connections to one or more servers to ensure that the virtual objects with which the user interacts are kept up to date.
Danny De Vleeschauwer   +3 more
doaj   +1 more source

A feature selection method of network traffic based on statistic and ranking strategy

open access: yesDianzi Jishu Yingyong, 2018
It is required to select the best features from so many ones in order to avoid the high complexity of the model, the low classification accuracy and efficiency caused by redundant and irrelevant features, if network traffic classification is obtained by ...
Liu Jiwei, Zhao Yuexian, Zhao Yang
doaj   +1 more source

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

open access: yes, 2014
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay   +3 more
core   +1 more source

Experimental and Theoretical Confirmation of Covalent Bonding in α‐Pu

open access: yesAdvanced Functional Materials, EarlyView.
From a combination of Reverse Monte Carlo dynamic rigid body fitting to the pair distribution functional and novel density functional approaches, the existence of covalent bonding is confirmed in α‐plutonium alongside other bonding types (i.e. mixed bonding schemes).
Alexander R. Muñoz   +10 more
wiley   +1 more source

Copper‐based Materials for Photo and Electrocatalytic Process: Advancing Renewable Energy and Environmental Applications

open access: yesAdvanced Functional Materials, EarlyView.
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida   +16 more
wiley   +1 more source

Trust Modeling in Wireless Sensor Networks: State of the Art

open access: yesJournal of Information Security and Cybercrimes Research, 2018
Wireless sensor networks (WSNs) is the backbone of the new generation of internet of things (IoT). WSNs are growing rapidly and security threats are increasingly growing as well. Trust computing plays a crucial role in WSN security modeling.
Mohammed Mahdi AlQahatani   +1 more
doaj   +1 more source

Nanofillers Reinforcing Biopolymer Composites for Sustainable Food Packaging Applications: A State‐of‐the‐Art Review

open access: yesAdvanced Functional Materials, EarlyView.
Biopolymers are sustainable, biodegradable alternatives to petroleum‐based plastics for food packaging. Its adoption is often limited by poor mechanical strength, barrier properties, and improved thermal stability through the incorporation of nanofillers.
Himakshi Baishya   +2 more
wiley   +1 more source

Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems

open access: yesSensors
With the significant increase in cyber-attacks and attempts to gain unauthorised access to systems and information, Network Intrusion-Detection Systems (NIDSs) have become essential detection tools.
Joaquín Gaspar Medina-Arco   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy