Results 71 to 80 of about 94,819 (182)

Urban growth pattern identification : a case study in Siem Reap, Cambodia [PDF]

open access: yes, 2012
The main purpose of this paper is to identify the pattern of urban growth from 1993 to 2011 in Siem reap town, Cambodia. Land use and land cover maps were generated from Landsat TM imageries from different years in order to extract the information ...
Ourng, Chanvoleak   +1 more
core  

Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection [PDF]

open access: yesarXiv, 2017
Nowadays, the Security Information and Event Management (SIEM) systems take on great relevance in handling security issues for critical infrastructures as Internet Service Providers. Basically, a SIEM has two main functions: i) the collection and the aggregation of log data and security information from disparate network devices (routers, firewalls ...
arxiv  

Placental mitochondrial metabolic adaptation maintains cellular energy balance in pregnancy complicated by gestational hypoxia

open access: yesThe Journal of Physiology, EarlyView.
Abstract figure legend Placental mitochondrial adaptation to gestational hypoxia. Hypoxic pregnancy in sheep increases placental insulin like growth factor 2 (IGF2) signalling (1), which is associated with a shift in capacity away from β‐oxidation (2) and complex I‐mediated respiration (3), while maintaining total oxidative phosphorylation capacity (4).
Wen Tong   +18 more
wiley   +1 more source

A Survey on Internet of Medical Things (IoMT): Enabling Technologies, Security and Explainability Issues, Challenges, and Future Directions

open access: yesExpert Systems, Volume 42, Issue 5, May 2025.
ABSTRACT Internet of Medical Things (IoMT) paradigm refers to the process of collection, transmission and analysis of healthcare data using communication and information systems over the internet. IoMT consist of medical devices that can link to the internet or other networks, including wearables, sensors, monitoring tools and other medical appliances.
Mert Melih Ozcelik   +2 more
wiley   +1 more source

Advancing security information and event management frameworks in managed enterprises using geolocation [PDF]

open access: yes, 2015
Includes bibliographical referencesSecurity Information and Event Management (SIEM) technology supports security threat detection and response through real-time and historical analysis of security events from a range of data sources.
Khan, Herah Anwar
core  

Markov Chain Monte Carlo on Finite State Spaces [PDF]

open access: yesarXiv, 2019
We elaborate the idea behind Markov chain Monte Carlo (MCMC) methods in a mathematically coherent, yet simple and understandable way. To this end, we proof a pivotal convergence theorem for finite Markov chains and a minimal version of the Perron-Frobenius theorem.
arxiv  

Military Supply Chain Logistics and Dynamic Capabilities: A Literature Review and Synthesis

open access: yesTransportation Journal, Volume 64, Issue 2, Spring 2025.
ABSTRACT Military supply chain logistics (MSCL) managers have pioneered innovation and thought in supply chain management (SCM). Given the ongoing conflicts and escalating international tensions of our world today, understanding the unique attributes and capabilities that shape MSCL management is imperative for navigating the broader international ...
David Loska   +4 more
wiley   +1 more source

Principles of data collection for building a secure enterprise infrastructure based on SIEM systems

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The purpose of the article is to present the main capabilities and advantages of implementing and using SIEM systems.Method. System analysis method was used.Result.
A. D. Popov, A. N. Nikitenko
doaj   +1 more source

Combination of Bio‐ and Organometallic Catalysis for the Synthesis of Dioxolanes in Organic Solvents

open access: yesChemCatChem, Volume 17, Issue 6, March 17, 2025.
In this process the cyclic acetals 4,5‐dipropyl‐1,3‐dioxolane and 4,5‐dibutyl‐1,3‐dioxolane are synthesized by one enzymatic and two organometallic steps in a single organic solvent. Starting from aldehydes, the obtained 2‐hydroxy ketones are further hydrogenated and converted into dioxolanes using H₂ and CO₂, with formic acid or polyoxymethylene as ...
Maria Nicolas   +8 more
wiley   +1 more source

Critical Infrastructure Protection: having SIEM technology cope with network heterogeneity [PDF]

open access: yesarXiv, 2014
Coordinated and targeted cyber-attacks to Critical Infrastructures (CIs) are becoming more and more frequent and sophisticated. This is due to: i) the recent technology shift towards Commercial Off-The-Shelf (COTS) products, and ii) new economical and socio-political motivations.
arxiv  

Home - About - Disclaimer - Privacy