Results 41 to 50 of about 58,524 (307)

Information Security Policy Modeling for Network Security Systems

open access: yesБезопасность информационных технологий, 2014
Policy management for network security systems (NSSs) is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities.
Dmitry Sergeevich Chernyavskiy
doaj  

Combination Model of Heterogeneous Data for Security Measurement [PDF]

open access: yesJournal of Universal Computer Science, 2019
Measuring security is a core step for guaranteeing security of network and information systems. Due to massiveness and heterogeneity of measurement data, it is difficult to classify and combine them on demand.
Xiuze Dong   +4 more
doaj   +3 more sources

Born to Fear the Machine? Genetic and Environmental Influences on Negative Attitudes toward AI Agents

open access: yesAdvanced Science, EarlyView.
Why do some people fear or distrust AI agents more than others? This twin study shows that negative attitudes toward AI may partly stem from genetic factors, linking them to traits like victim sensitivity and moral beliefs. These findings show that it is not only nurture but also nature that shapes our views of AI, with implications for future human–AI
Xiaojiayu Tan   +7 more
wiley   +1 more source

Bioinspired Intelligent Soft Robotics: From Multidisciplinary Integration to Next‐Generation Intelligence

open access: yesAdvanced Science, EarlyView.
Soft robotics, featuring intrinsic compliance and biomimetic adaptability, emerges as transformative in next‐generation intelligent systems. This review outlines how advancements in four foundational domains—actuation, materials, manufacturing, and control—drive the evolution of bioinspired intelligent soft robotics, poised to redefine the boundaries ...
Xiaopeng Wang   +7 more
wiley   +1 more source

A formal approach for network security policy validation

open access: yes, 2017
Network security is a crucial aspect for administrators due to increasing network size and number of functions and controls (e.g. firewall, DPI, parental control). Errors in configuring security controls may result in serious security breaches and vulnerabilities (e.g.
VALENZA, FULVIO   +5 more
openaire   +4 more sources

How did consumers change their grocery spending in response to changes in Supplemental Nutrition Assistance Program benefit generosity?

open access: yesApplied Economic Perspectives and Policy, EarlyView.
Abstract In this paper, we examine the impact of reducing Supplemental Nutrition Assistance Program (SNAP) benefits on grocery purchases using data from Circana. We use an imputed difference‐in‐difference model to exploit state‐level variation in decisions to remove pandemic‐era SNAP emergency allotments to estimate the impact of such policies. We find
Kassandra Martinchek   +3 more
wiley   +1 more source

Adaptive Policy-Oriented Cybersecurity: A Decentralized Framework Using Message Passing Algorithms for Dynamic Threat Mitigation

open access: yesIEEE Access
In the face of increasingly sophisticated and dynamic cyber threats, policy-based cybersecurity deployment has emerged as a critical strategy for securing modern, complex network infrastructures.
Spyridon Evangelatos   +8 more
doaj   +1 more source

Development Status and Future Prospects of Hydrogen Energy Technology: Production, Storage, and Cost Analysis

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
Hydrogen is an energy carrier, produced from renewable and nonrenewable resources. It can be stored in a variety of materials and transported to distant locations. This article reviews progress in hydrogen technology by looking at environmental and economic impact, cost analysis, and policy support at government level as way forward for bringing it to ...
Xuexue Pan   +5 more
wiley   +1 more source

Unification of Information Security Policies for Network Security Solutions

open access: yesБезопасность информационных технологий, 2012
Diversity of command languages on network security solutions’ (NSS) interfaces causes problems in a process of information security policy (ISP) deployment.
D.S. Chernyavskiy
doaj  

A Detailed Comprehensive Role of Digital Technologies in Green Finance Initiative for Net‐Zero Energy Transition

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
This study aims to provide actionable recommendations for leveraging digital innovation for the achievement of scalable, equitable, and transparent Net Zero Energy Transition by offering actionable recommendations. As a result of this comprehensive analysis, the review highlights the critical interplay between digital technologies and GF as vital ...
Furkan Ahmad   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy