Results 31 to 40 of about 834,303 (333)

Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies

open access: yesNetwork and Distributed System Security Symposium, 2020
The Content Security Policy (CSP) mechanism was developed as a mitigation against script injection attacks in 2010. In this paper, we leverage the unique vantage point of the Internet Archive to conduct a historical and longitudinal analysis of how CSP ...
S. Roth   +4 more
semanticscholar   +1 more source

Correction: The ‘PROTECT’ Essential Elements in Managing Crisis Data Policies

open access: yesData Science Journal
This article details a correction to the article: Zhang, L., Ekmekci, P.E., Murray, V., Basbug Erkan, B., Crawley, F.P., Li, X. and Li, Y. (2024) ‘The ‘PROTECT’ Essential Elements in Managing Crisis Data Policies’, Data Science Journal, 23(1), p.
Lili Zhang   +6 more
doaj   +1 more source

Research on network information security model and system construction

open access: yesSHS Web of Conferences, 2016
It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security.
Wang Haijun
doaj   +1 more source

Maritime Traffic Evaluation Using Spatial-Temporal Density Analysis Based on Big AIS Data

open access: yesApplied Sciences, 2022
For developing national maritime traffic routes through the coastal waters of Korea, the customary maritime traffic flow must be accurately identified and quantitatively evaluated.
Yoon-Ji Kim   +6 more
doaj   +1 more source

The ‘PROTECT’ Essential Elements in Managing Crisis Data Policies

open access: yesData Science Journal
Based on a literature review, policy study, and a conference session discussion, this paper systematically analyzed seven predominant elements in crisis data policies, namely ‘people, resources, operation, technology, ethics, communication, and trust ...
Lili Zhang   +6 more
doaj   +1 more source

SITTING OUTSIDE THE NETWORK: REASSURING THE STABILITY OF THE TAIWAN STRAIT UNDER THE TRUMP ADMINISTRATION

open access: yesRevista UNISCI, 2018
: The US security policy toward East Asia since Obama administration’s policy of “Pivot” had transformed its security partnership with the East Asia allies.
Ping-Kuei Chen
doaj   +1 more source

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Policy increasing security companies on the internet [PDF]

open access: yesEkonomski Pogledi, 2015
Enterprise Security on the Internet is of crucial importance for the business, irrespective of the fact that the cost of developing the solutions necessary for proper protection are often quite large.
Trajković Slaviša   +2 more
doaj   +1 more source

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

Automatic Verification Analysis Technology of Network Security Domain

open access: yesDianxin kexue, 2015
By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy ...
Xiaofeng Liu   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy