Results 131 to 140 of about 812,870 (286)
Zero-trust architecture (ZTA) requires continuous and adaptive identity authentication to maintain security in dynamic environments. However, current federated learning (FL)-based authentication models often struggle to incorporate evolving attack ...
Jie Ji, Shi Qiu, Shengpeng Ye, Xin Liu
doaj +1 more source
Setup‐Optimized Sequencing in Job Shops: Modeling Workstation Productivity and Lateness Behavior
Setup‐optimized sequencing in job‐shop production creates a trade‐off between productivity improvement and schedule reliability. A WIP‐explicit modeling framework links sequencing‐induced productivity gains and lateness dispersion through the production operating curve.
Friederike Stefanowski +2 more
wiley +1 more source
ОСОБЛИВОСТІ РЕАЛІЗАЦІЇ МЕРЕЖЕВИХ АТАК ЧЕРЕЗ TCP/IP-ПРОТОКОЛИ
У статті здійснено дослідження особливостей реалізації типових мережевих атак, що ґрунтуються на експлуатації уразливостей протоколів стеку TCP/IP, які є критичною інфраструктурною основою глобальної мережевої взаємодії.
Юлія Костюк +5 more
doaj +1 more source
ZERO-TRUST AI SECURITY: INTEGRATING AI INTO ZERO-TRUST ARCHITECTURES
Abstract The fast incorporation of artificial intelligence (AI) into enterprise and critical infrastructure systems has brought new security risks that are difficult to counter with conventional defense solutions. A relatively recent model, Zero-Trust Architecture (ZTA), which is based on the principles of continuous verification, least privilege ...
NAYAN GOEL, NANDAN GUPTA
openaire +1 more source
Influence of an Oxygen‐Free Atmosphere on Diamond‐Single‐Grain Scratching of Ti–6Al–4V
Single‐grain scratching of Ti–6Al–4V is investigated under controlled, oxygen‐free, and ambient atmospheres using a novel experimental setup with in situ high‐speed imaging. The approach enables direct observation of chip formation and adhesion under suppressed oxidation.
Berend Denkena +2 more
wiley +1 more source
МЕТОД КОМБІНОВАНОГО ШИФРУВАННЯ ДАНИХ В ХМАРНИХ СЕРЕДОВИЩАХ
Стаття присвячена розробленню методу криптографічного захисту даних у корпоративних хмарних середовищах на засадах концепції Zero Trust з урахуванням вимог до продуктивності, масштабованості та прогнозованості затримок. У вступі обґрунтовано актуальність
Олександр Трофімов
doaj +1 more source
This study investigates laser‐based oxide removal of Cu inserts in oxygen‐free conditions and examines long‐term oxidation kinetics and surface chemistry under different atmospheres via X‐ray photoelectron spectroscopy. Al–Cu compound casting with differently oxidized surfaces is performed, and intermetallic phase formation, morphology, and thermal ...
Timon Steinhoff +9 more
wiley +1 more source
A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems
Over the last couple of years, the application of autonomous systems such as drones has been widely accepted, and these applications are used in the defense, safety, logistics, delivery, and consumer sectors.
Alanoud A. Alquwayzani +1 more
doaj +1 more source
Through direct application of porous transport layer (PTL) on the bipolar plate (BPP) with thermal spraying, the interfacial contact resistance is improved. With the cold gas sprayed BPP–PTL coating system, a proton exchange membrane water electrolysis cell with a cell voltage of Ucell = 1.9 V can be operated up to i = 2.5 A/cm2 in a dynamic mode ...
Kirsten Bobzin +5 more
wiley +1 more source
A data plane security model of SR-BE/TE based on zero-trust architecture. [PDF]
Wang L +5 more
europepmc +1 more source

