Results 31 to 40 of about 36,499 (202)

ІНТЕГРУВАННЯ ТА ЗАХИСТ ІОТ ПРИСТРОЇВ У НАЯВНІЙ ІНФРАСТРУКТУРІ КОМП’ЮТЕРНОЇ МЕРЕЖІ ЗАКЛАДУ ОСВІТИ

open access: yesКібербезпека: освіта, наука, техніка, 2021
Розвиток комп’ютерних мереж набирає стрімкого розвитку. Постають нові виклики по забезпеченню безпеки даних та самих кінцевих користувачів. Із появою Інтернет Речей дана проблема встала досить гостро перед мережевими інженерами та кібераналітиками.
Valerii Lakhno   +4 more
doaj   +1 more source

A WebRTC Video Chat Implementation Within the Yioop Search Engine [PDF]

open access: yes, 2019
Web real-time communication (abbreviated as WebRTC) is one of the latest Web application technologies that allows voice, video, and data to work collectively in a browser without a need for third-party plugins or proprietary software installation.
Ho, Yangcha
core   +1 more source

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

WAF ЗАХИСТУ ВНУТРІШНІХ СЕРВІСІВ У СТРУКТУРІ ZERO TRUST

open access: yesКібербезпека: освіта, наука, техніка, 2021
Сучасний світ висуває високі вимоги до IT-інфраструктури та комп’ютерних мереж підприємств, що обумовлює складність їх структур. Чим складніша структура і кількість ланок, що входять до неї, тим вища імовірність появи вразливих місць.
Valerii Lakhno   +5 more
doaj   +1 more source

Pemanfaatan Intrusion Detection System (Ids) Sebagai Otomatisasi Konfigurasi Firewall Berbasis Web Service Menggunakan Arsitektur Representational State Transfer (Rest) [PDF]

open access: yes, 2013
Many things can destabilize a computer network connections, both with regard to hardware and software. Therefore, we need a technique for network security, one of them is firewall.
Astuti, Y. (Yenni)   +2 more
core  

IoT security through web application firewall

open access: yesInternational Journal of Engineering & Technology, 2018
The current trend in home electronics needs to be Internet Connectivity. Internet of Things is a collection of many interconnected objects, services and devices that can communicate and share the data to achieve a common goal in different areas and applications using internet.
B Prema Sindhuri, M Kameswara Rao
openaire   +2 more sources

Securing information resources using web application firewalls [PDF]

open access: yesBusiness Informatics, 2015
Petr A. Baranov - Associate Professor, Department of Innovations and Business in IT, National Research University Higher School of Economics Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation. E-mail: pbaranov@hse.ruEldar R. Beybutov - MSc Program Student, Faculty of Business and Management, National Research University Higher School ...
BARANOV P.A., BEYBUTOV E.R.
openaire   +2 more sources

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Enhancing Web Application Security with Open-AppSec WAF on CDN Infrastructure

open access: yesJournal of Information Systems and Informatics
The increasing number of cyberattacks targeting web applications has made security a critical concern, with vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Broken Authentication, and Cross-Site Request Forgery (CSRF) remaining ...
Andi Yusdar Al Imran   +2 more
doaj   +1 more source

Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro

open access: yesJurnal Teknologi dan Sistem Komputer, 2015
The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users.
Dyakso Anindito Nugroho   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy