Results 71 to 80 of about 36,499 (202)
Periodontal Medicine Rewired: Mechanisms Linking Periodontitis to Systemic Diseases
This review reorganizes decades of research in periodontal medicine into a multi‐dimensional framework, illustrating how periodontitis influences systemic health through at least seven interconnected mechanisms. ABSTRACT Periodontitis is now recognized not merely as a localized oral condition but as a systemic disease linked to over 70 communicable and
Mario Romandini +3 more
wiley +1 more source
This study presents an evaluation of Coraza Web Application Firewall (WAF) performance when integrated with two reverse proxy environments, Caddy and Envoy, which utilize the Open Web Application Security Project (OWASP) Core Rule Set version 4.15.0 ...
Michael Curipallo Martínez +4 more
doaj +1 more source
SISTEM PENGAMANAN WEB SERVER DENGAN WEB APPLICATION FIREWALL (WAF
Abstrak. Seiring dengan perkembangan jaringan internet dan semakin banyaknya pengguna aplikasi pada platform web, ancaman terhadap keamanan data dan informasi juga semakin meningkat. Berdasarkan laporan yang dibuat oleh IBM research development, serangan pada aplikasi web yang paling populer pada retang waktu tahun 2009 sampai 2013 adalah SQL ...
I Made Suartana +2 more
openaire +1 more source
Fossil fuel feuds and the ICJ Advisory Opinion on Climate Change
Abstract The Advisory Opinion on Obligations of States in Respect of Climate Change by the International Court of Justice (ICJ) breaks new ground by clearly identifying fossil fuel production, licensing and subsidisation among the activities to which international climate change obligations apply, going as far as suggesting that such activities may ...
Harro van Asselt, Tejas Rao
wiley +1 more source
Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems
Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing ...
Bonomi, Silvia +4 more
core +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
Data protection is one of the most essential elements of cyber security strategies and processes. One of the components that support this process are firewalls, particularly web application firewalls (WAFs).
Mariusz Sepczuk, Krzysztof Sosnowski
doaj +1 more source
The HSS/SNiC : a conceptual framework for collapsing security down to the physical layer [PDF]
This work details the concept of a novel network security model called the Super NIC (SNIC) and a Hybrid Super Switch (HSS). The design will ultimately incorporate deep packet inspection (DPI), intrusion detection and prevention (IDS/IPS) functions, as ...
Binns, Richard +2 more
core
Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture [PDF]
The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures.
Hyland, Joe
core +1 more source

