Results 71 to 80 of about 36,499 (202)

Periodontal Medicine Rewired: Mechanisms Linking Periodontitis to Systemic Diseases

open access: yesJournal of Periodontal Research, EarlyView.
This review reorganizes decades of research in periodontal medicine into a multi‐dimensional framework, illustrating how periodontitis influences systemic health through at least seven interconnected mechanisms. ABSTRACT Periodontitis is now recognized not merely as a localized oral condition but as a systemic disease linked to over 70 communicable and
Mario Romandini   +3 more
wiley   +1 more source

Web Application Protection Optimization Through Coraza WAF: Performance Assessment Against OWASP Risks in Reverse Proxy Configurations

open access: yesEngineering Proceedings
This study presents an evaluation of Coraza Web Application Firewall (WAF) performance when integrated with two reverse proxy environments, Caddy and Envoy, which utilize the Open Web Application Security Project (OWASP) Core Rule Set version 4.15.0 ...
Michael Curipallo Martínez   +4 more
doaj   +1 more source

SISTEM PENGAMANAN WEB SERVER DENGAN WEB APPLICATION FIREWALL (WAF

open access: yesScan : Jurnal Teknologi Informasi dan Komunikasi, 2015
Abstrak. Seiring dengan perkembangan jaringan internet dan semakin banyaknya pengguna aplikasi pada platform web, ancaman terhadap keamanan data dan informasi juga semakin meningkat. Berdasarkan laporan yang dibuat oleh IBM research development, serangan pada aplikasi web yang paling populer pada retang waktu tahun 2009 sampai 2013 adalah SQL ...
I Made Suartana   +2 more
openaire   +1 more source

Fossil fuel feuds and the ICJ Advisory Opinion on Climate Change

open access: yesReview of European, Comparative &International Environmental Law, EarlyView.
Abstract The Advisory Opinion on Obligations of States in Respect of Climate Change by the International Court of Justice (ICJ) breaks new ground by clearly identifying fossil fuel production, licensing and subsidisation among the activities to which international climate change obligations apply, going as far as suggesting that such activities may ...
Harro van Asselt, Tejas Rao
wiley   +1 more source

Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems

open access: yes, 2018
Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing ...
Bonomi, Silvia   +4 more
core   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Using the Reinforcement Learning Agent to Test the Correctness of Rule Configuration in Web Application Firewalls

open access: yesIEEE Access
Data protection is one of the most essential elements of cyber security strategies and processes. One of the components that support this process are firewalls, particularly web application firewalls (WAFs).
Mariusz Sepczuk, Krzysztof Sosnowski
doaj   +1 more source

The HSS/SNiC : a conceptual framework for collapsing security down to the physical layer [PDF]

open access: yes, 2008
This work details the concept of a novel network security model called the Super NIC (SNIC) and a Hybrid Super Switch (HSS). The design will ultimately incorporate deep packet inspection (DPI), intrusion detection and prevention (IDS/IPS) functions, as ...
Binns, Richard   +2 more
core  

Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture [PDF]

open access: yes, 2020
The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures.
Hyland, Joe
core   +1 more source

Home - About - Disclaimer - Privacy