Results 31 to 40 of about 834,303 (333)
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies
The Content Security Policy (CSP) mechanism was developed as a mitigation against script injection attacks in 2010. In this paper, we leverage the unique vantage point of the Internet Archive to conduct a historical and longitudinal analysis of how CSP ...
S. Roth +4 more
semanticscholar +1 more source
Correction: The ‘PROTECT’ Essential Elements in Managing Crisis Data Policies
This article details a correction to the article: Zhang, L., Ekmekci, P.E., Murray, V., Basbug Erkan, B., Crawley, F.P., Li, X. and Li, Y. (2024) ‘The ‘PROTECT’ Essential Elements in Managing Crisis Data Policies’, Data Science Journal, 23(1), p.
Lili Zhang +6 more
doaj +1 more source
Research on network information security model and system construction
It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security.
Wang Haijun
doaj +1 more source
Maritime Traffic Evaluation Using Spatial-Temporal Density Analysis Based on Big AIS Data
For developing national maritime traffic routes through the coastal waters of Korea, the customary maritime traffic flow must be accurately identified and quantitatively evaluated.
Yoon-Ji Kim +6 more
doaj +1 more source
The ‘PROTECT’ Essential Elements in Managing Crisis Data Policies
Based on a literature review, policy study, and a conference session discussion, this paper systematically analyzed seven predominant elements in crisis data policies, namely ‘people, resources, operation, technology, ethics, communication, and trust ...
Lili Zhang +6 more
doaj +1 more source
: The US security policy toward East Asia since Obama administration’s policy of “Pivot” had transformed its security partnership with the East Asia allies.
Ping-Kuei Chen
doaj +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
Policy increasing security companies on the internet [PDF]
Enterprise Security on the Internet is of crucial importance for the business, irrespective of the fact that the cost of developing the solutions necessary for proper protection are often quite large.
Trajković Slaviša +2 more
doaj +1 more source
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié +13 more
wiley +1 more source
Automatic Verification Analysis Technology of Network Security Domain
By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy ...
Xiaofeng Liu +3 more
doaj +2 more sources

