Results 41 to 50 of about 58,524 (307)
Information Security Policy Modeling for Network Security Systems
Policy management for network security systems (NSSs) is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities.
Dmitry Sergeevich Chernyavskiy
doaj
Combination Model of Heterogeneous Data for Security Measurement [PDF]
Measuring security is a core step for guaranteeing security of network and information systems. Due to massiveness and heterogeneity of measurement data, it is difficult to classify and combine them on demand.
Xiuze Dong+4 more
doaj +3 more sources
Why do some people fear or distrust AI agents more than others? This twin study shows that negative attitudes toward AI may partly stem from genetic factors, linking them to traits like victim sensitivity and moral beliefs. These findings show that it is not only nurture but also nature that shapes our views of AI, with implications for future human–AI
Xiaojiayu Tan+7 more
wiley +1 more source
Soft robotics, featuring intrinsic compliance and biomimetic adaptability, emerges as transformative in next‐generation intelligent systems. This review outlines how advancements in four foundational domains—actuation, materials, manufacturing, and control—drive the evolution of bioinspired intelligent soft robotics, poised to redefine the boundaries ...
Xiaopeng Wang+7 more
wiley +1 more source
A formal approach for network security policy validation
Network security is a crucial aspect for administrators due to increasing network size and number of functions and controls (e.g. firewall, DPI, parental control). Errors in configuring security controls may result in serious security breaches and vulnerabilities (e.g.
VALENZA, FULVIO+5 more
openaire +4 more sources
Abstract In this paper, we examine the impact of reducing Supplemental Nutrition Assistance Program (SNAP) benefits on grocery purchases using data from Circana. We use an imputed difference‐in‐difference model to exploit state‐level variation in decisions to remove pandemic‐era SNAP emergency allotments to estimate the impact of such policies. We find
Kassandra Martinchek+3 more
wiley +1 more source
In the face of increasingly sophisticated and dynamic cyber threats, policy-based cybersecurity deployment has emerged as a critical strategy for securing modern, complex network infrastructures.
Spyridon Evangelatos+8 more
doaj +1 more source
Hydrogen is an energy carrier, produced from renewable and nonrenewable resources. It can be stored in a variety of materials and transported to distant locations. This article reviews progress in hydrogen technology by looking at environmental and economic impact, cost analysis, and policy support at government level as way forward for bringing it to ...
Xuexue Pan+5 more
wiley +1 more source
Unification of Information Security Policies for Network Security Solutions
Diversity of command languages on network security solutions’ (NSS) interfaces causes problems in a process of information security policy (ISP) deployment.
D.S. Chernyavskiy
doaj
This study aims to provide actionable recommendations for leveraging digital innovation for the achievement of scalable, equitable, and transparent Net Zero Energy Transition by offering actionable recommendations. As a result of this comprehensive analysis, the review highlights the critical interplay between digital technologies and GF as vital ...
Furkan Ahmad+3 more
wiley +1 more source