Results 101 to 110 of about 305,823 (288)

АНАЛІЗ ІСНУЮЧИХ МЕТОДІВ КІБЕРНЕТИЧНОЇ РОЗВІДКИ ІНФОРМАЦІЙНО-ТЕЛЕКОМУНІКАЦІЙНИХ МЕРЕЖ

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
В статті розглядається проблема нейтралізації загроз національній безпеці у кібернетичному просторі, що обумовлюється стрімким зростанням залежності державних та військових органів управління від використання автоматизованих систем управління, які є ...
Vitalii A. Savchenko   +2 more
doaj  

Dynamic Authorization Specification for RBAC at CERN [PDF]

open access: yes, 2009
Role-based access control (RBAC) project at CERN was designed to protect from accidental and unauthorized access to the LHC and injector equipment. Our model of RBAC introduces concept of dynamic authorization.
Yastrebov, Ilia
core  

Digital Technologies for Transparent and Sustainable Supply Chain Management: A Resource Orchestration‐Based View in the Textile Industry

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Implementing digital technologies is touted as the next big step for the firms aiming to improve sustainability in their supply chains. These technologies are often credited with the potential to improve transparency and achieve sustainability.
Amna Farrukh, Aqeel Ahmed, Sadaat Yawar
wiley   +1 more source

DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM

open access: yesIraqi Journal of Information & Communication Technology, 2019
Network attacks are classified according to their objective into three types: Denial of Services (DOS), reconnaissance and unauthorized access. A base signature Intrusion Detection System (IDS) which gives an alarm when the monitor network traffic meets
Subhi A. Mohammed
doaj   +1 more source

Depression, Anxiety and Criminal Behaviour Between Ages 32 and 48: A Propensity Score Matching Analysis From the Cambridge Study in Delinquent Development

open access: yesCriminal Behaviour and Mental Health, EarlyView.
ABSTRACT Background Depression, anxiety and criminal behaviour are often correlated, but the direction and nature of these associations remain contested. Aims To investigate the temporal relationships between depression and/or anxiety and criminal behaviour at age 32 and depression and/or anxiety and criminal behaviour at age 48.
Kim Reising, Maria M. Ttofi
wiley   +1 more source

Can ISO/IEC 17025 serve as a tool to prevent scientific fraud in chemical research laboratories?

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract Scientific fraud has been documented across multiple disciplines, and chemistry is no exception. Recent studies indicate that contamination of materials, methodological errors, and unreliable data, results, or analyses account for over 25% of retracted publications.
Flor Monica Gutierrez‐Alcantara
wiley   +1 more source

Portal authentication HTTP redirection using netfilter NFQUEUE

open access: yesTongxin xuebao, 2014
When using portal for user authentication,unauthorized user's HTTP access should be redirected to portal login page to help user do authentication.Using netfilter NFQUEUE target send unauthorized user TCP port 80 packets to user-space program redir_http ...
Huan-jie ZHANG, Yu-liang XIA
doaj   +2 more sources

Product‐Related CSR in the Digital Era: Communication Patterns That Drive Consumer Interactions on Social Media

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT To meet rising sustainability demands, companies increasingly use social media to communicate product‐related CSR initiatives. Consumers' interactions with these messages largely depend on the messages' perceived credibility. However, there remains limited understanding of how firms combine communication characteristics into distinct patterns ...
Judith Derenthal, Waldemar Toporowski
wiley   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy