Results 251 to 260 of about 402,945 (286)
Some of the next articles are maybe not open access.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Software-Defined Network (SDN) is getting popular and increasingly deployed in both of academia and industry. As a result of which, its security issue is being magnified as a critical controversy, and some pioneering researchers have investigated the vulnerabilities of SDN to discover the feasibility of compromising SDN networks. Especially, they prove
Chanhee Lee, Seungwon Shin
openaire +1 more source
Software-Defined Network (SDN) is getting popular and increasingly deployed in both of academia and industry. As a result of which, its security issue is being magnified as a critical controversy, and some pioneering researchers have investigated the vulnerabilities of SDN to discover the feasibility of compromising SDN networks. Especially, they prove
Chanhee Lee, Seungwon Shin
openaire +1 more source
Dimensions of Critical Care Nursing, 2005
Unlike traditional moisturizers, shielding lotions help keep out irritants such as latex allergens and antibacterial soaps while locking in the skin's natural moisture.
openaire +2 more sources
Unlike traditional moisturizers, shielding lotions help keep out irritants such as latex allergens and antibacterial soaps while locking in the skin's natural moisture.
openaire +2 more sources
Proceedings of the 45th annual Design Automation Conference, 2008
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Previous attempts to detect code injection in MPSoCs have been burdened with significant performance overheads.
Krutartha Patel, Sri Parameswaran
openaire +1 more source
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Previous attempts to detect code injection in MPSoCs have been burdened with significant performance overheads.
Krutartha Patel, Sri Parameswaran
openaire +1 more source
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Machine learning classification has enabled many innovative services, e.g., in medicine, biometrics, and finance. Current practices of sharing sensitive input data or classification models, however, causes privacy concerns among the users and business risk among the providers. In this work, we resolve the conflict between privacy and business interests
Jan Henrik Ziegeldorf +2 more
openaire +1 more source
Machine learning classification has enabled many innovative services, e.g., in medicine, biometrics, and finance. Current practices of sharing sensitive input data or classification models, however, causes privacy concerns among the users and business risk among the providers. In this work, we resolve the conflict between privacy and business interests
Jan Henrik Ziegeldorf +2 more
openaire +1 more source
This chapter explores Marianne Moore’s understudied admiration for Haile Selassie, the last reigning emperor of the Ethiopia’s Solomonic dynasty. Moore’s archive includes numerous press clippings and literature—spanning four decades—concerning Selassie, the “Lion of Judah,” who became an international celebrity during the mid-twentieth century when, in
openaire +1 more source
openaire +1 more source
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
The openness of PS systems renders them vulnerable to malicious users that can pollute the measurement collection process, in an attempt to degrade the PS system data and, overall, its usefulness. Mitigating such adversarial behavior is hard. Cryptographic protection, authentication, authorization, and access control can help but they do not fully ...
Stylianos Gisdakis +2 more
openaire +1 more source
The openness of PS systems renders them vulnerable to malicious users that can pollute the measurement collection process, in an attempt to degrade the PS system data and, overall, its usefulness. Mitigating such adversarial behavior is hard. Cryptographic protection, authentication, authorization, and access control can help but they do not fully ...
Stylianos Gisdakis +2 more
openaire +1 more source
Shielding Effectiveness Theory of Shielding
2019The hypothesis upon which the present accepted theory of shielding consisting of the equation SE = R + A + B is based is presented. The hypothesis is based on wave theory and the analogy between transmission lines and the penetration of a wave through a barrier. A detailed analysis, comparing the value of the current delivered to a load impedance using
openaire +1 more source
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, 2004
Software patching has not been effective as a first-line defense against large-scale worm attacks, even when patches have long been available for their corresponding vulnerabilities. Generally, people have been reluctant to patch their systems immediately, because patches are perceived to be unreliable and disruptive to apply.
Helen J. Wang +3 more
openaire +1 more source
Software patching has not been effective as a first-line defense against large-scale worm attacks, even when patches have long been available for their corresponding vulnerabilities. Generally, people have been reluctant to patch their systems immediately, because patches are perceived to be unreliable and disruptive to apply.
Helen J. Wang +3 more
openaire +1 more source
Physics Today, 1949
One and a half tons of the lead plates used over fifty years ago in printing the first issues of the Physical Review, then published at Cornell University, have been turned over to the University's Laboratory of Nuclear Studies where they will become part of the shielding for high-energy radiation equipment.
openaire +1 more source
One and a half tons of the lead plates used over fifty years ago in printing the first issues of the Physical Review, then published at Cornell University, have been turned over to the University's Laboratory of Nuclear Studies where they will become part of the shielding for high-energy radiation equipment.
openaire +1 more source

