Results 61 to 70 of about 37,268 (180)

An Open Distributed VPN Management System for a Multi-Domain Management World [PDF]

open access: yes, 1997
Virtual Private Network (VPN) services aim at providing users a single management interface to a heterogeneous global network infrastructure. Various interoperability problems have to be overcome in order to implement this service in a way that it appears to be simple and easy to use.
H. Khayat   +3 more
openaire   +1 more source

Experiences of Diagnostic Radiography Students With Workplace‐Based and Online Learning During the COVID‐19 Pandemic: A Study Across Four Higher Education Institutions in South Africa

open access: yesJournal of Medical Radiation Sciences, EarlyView.
This study explored diagnostic radiography students' learning experiences during COVID‐19 across four South African Higher Education Institutions. Themes included challenges with clinical placements, PPE and online learning, as well as inclusive learning enablers. Findings inform strategies to support students during future crises.
Siyabonga Goodwill Hadebe   +2 more
wiley   +1 more source

Using VPNS and RIS to ensure communication security in dynamic UAV swarm networks: integration paths, resource allocation, and simulation results

open access: yesАвіаційно-космічна техніка та технологія
The subject of this paper is the integration of virtual private networks (VPN) and Reconfigurable Intelligent Surfaces (RIS) technologies into swarm systems of unmanned aerial vehicles (UAVs). The goal is to investigate the possibilities of improving the
Ruslan Demura
doaj   +1 more source

Performance of a Deep Learning Algorithm for Melanoma Classification Across Diverse Dermoscopic and Tele‐Dermatology Datasets

open access: yesJEADV Clinical Practice, EarlyView.
ABSTRACT Background Early detection of melanoma significantly boosts patient survival rates. Deep learning has demonstrated dermatologist‐level accuracy in assessing pigmented skin lesions by analysing images at the pixel level. However, these neural networks may face challenges with ‘real‐life’ images due to limited training data and image artefacts ...
Marianne Zanchetta   +15 more
wiley   +1 more source

The Application of Telemedicine in Surgery

open access: yesMed Research, EarlyView.
This figure provides an overview of the content presented in this article. Telemedicine is integrated throughout the entire surgical workflow, with distinct applications across the preoperative, intraoperative, and postoperative phases. These applications are enabled by a suite of supporting technologies, while the associated implementation challenges ...
Yufan Yang   +8 more
wiley   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

A model for the analysis of security policies in service function chains

open access: yes, 2017
Two emerging architectural paradigms, i.e., Software Defined Networking (SDN) and Network Function Virtualization (NFV), enable the deployment and management of Service Function Chains (SFCs).
Durante, L.   +3 more
core   +1 more source

Does Investors’ Information‐acquisition Ability Affect IPO Underpricing? Evidence from a Quasi‐natural Experiment

open access: yesAbacus, EarlyView.
Initial public offering (IPO) underpricing, driven by information asymmetry, is a prevalent and serious global phenomenon. In addition to the influence of information providers such as IPO firms, investors’ ability to acquire information may also significantly affect IPO underpricing.
Haipeng Yu   +3 more
wiley   +1 more source

Analysis of BitTorrent on an Open Source VPN Technology to End User

open access: yesComputer and Information Science, 2009
Normal 0 7.8 ? 0 2 false false false /* Style Definitions */ table.MsoNormalTable {mso-style-name:????; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para ...
Farok Azmat   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy