Results 101 to 110 of about 305,823 (288)
АНАЛІЗ ІСНУЮЧИХ МЕТОДІВ КІБЕРНЕТИЧНОЇ РОЗВІДКИ ІНФОРМАЦІЙНО-ТЕЛЕКОМУНІКАЦІЙНИХ МЕРЕЖ
В статті розглядається проблема нейтралізації загроз національній безпеці у кібернетичному просторі, що обумовлюється стрімким зростанням залежності державних та військових органів управління від використання автоматизованих систем управління, які є ...
Vitalii A. Savchenko +2 more
doaj
Dynamic Authorization Specification for RBAC at CERN [PDF]
Role-based access control (RBAC) project at CERN was designed to protect from accidental and unauthorized access to the LHC and injector equipment. Our model of RBAC introduces concept of dynamic authorization.
Yastrebov, Ilia
core
ABSTRACT Implementing digital technologies is touted as the next big step for the firms aiming to improve sustainability in their supply chains. These technologies are often credited with the potential to improve transparency and achieve sustainability.
Amna Farrukh, Aqeel Ahmed, Sadaat Yawar
wiley +1 more source
Network attacks are classified according to their objective into three types: Denial of Services (DOS), reconnaissance and unauthorized access. A base signature Intrusion Detection System (IDS) which gives an alarm when the monitor network traffic meets
Subhi A. Mohammed
doaj +1 more source
ABSTRACT Background Depression, anxiety and criminal behaviour are often correlated, but the direction and nature of these associations remain contested. Aims To investigate the temporal relationships between depression and/or anxiety and criminal behaviour at age 32 and depression and/or anxiety and criminal behaviour at age 48.
Kim Reising, Maria M. Ttofi
wiley +1 more source
Can ISO/IEC 17025 serve as a tool to prevent scientific fraud in chemical research laboratories?
Abstract Scientific fraud has been documented across multiple disciplines, and chemistry is no exception. Recent studies indicate that contamination of materials, methodological errors, and unreliable data, results, or analyses account for over 25% of retracted publications.
Flor Monica Gutierrez‐Alcantara
wiley +1 more source
Portal authentication HTTP redirection using netfilter NFQUEUE
When using portal for user authentication,unauthorized user's HTTP access should be redirected to portal login page to help user do authentication.Using netfilter NFQUEUE target send unauthorized user TCP port 80 packets to user-space program redir_http ...
Huan-jie ZHANG, Yu-liang XIA
doaj +2 more sources
ABSTRACT To meet rising sustainability demands, companies increasingly use social media to communicate product‐related CSR initiatives. Consumers' interactions with these messages largely depend on the messages' perceived credibility. However, there remains limited understanding of how firms combine communication characteristics into distinct patterns ...
Judith Derenthal, Waldemar Toporowski
wiley +1 more source
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel +5 more
wiley +1 more source
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi +4 more
wiley +1 more source

