A fully integrated D-band direct-conversion I/Q transmitter and receiver chipset in SiGe BiCMOS technology

S Carpenter, H Zirath, ZS He… - … of Communications and …, 2021 - ieeexplore.ieee.org
This paper presents design and characterization of single-chip 110–170 GHz (D-band)
direct conversion in-phase/quadrature-phase (I/Q) transmitter and receiver monolithic …

An efficient hybrid deep learning approach for internet security

F Ertam - Physica A: Statistical Mechanics and Its Applications, 2019 - Elsevier
Nowadays, internet is mostly used communication tool worldwide. However, the major
problem of the internet is to provide security. To provide internet security, many researches …

[PDF][PDF] Clustering-based Approach for Anomaly Detection in XACML Policies.

MA El Hadj, M Ayache, Y Benkaouz, A Khoumsi… - SECRYPT, 2017 - scitepress.org
The development of distributed applications arises multiple security issues such as access
control. Attribute-Based Access Control has been proposed as a generic access control …

Traffic and overhead analysis of applied pre-filtering ACL firewall on HPC service network

JK Lee, T Hong, G Li - Journal of Communications and …, 2021 - ieeexplore.ieee.org
In an high-performance computing (HPC), supercomputing service environment, the security
of infrastructure nodes that are points of contact for researchers is very important. We have …

A systematic study of network firewall and its implementation

R Alsaqour, A Motmi, M Abdelhaq - International journal of …, 2021 - kiss.kstudy.com
This is an era of technology and with the rapid growth of the Internet, networks are
continuously growing. Companies are shifting from simple to more complex networks. Since …

Analisa sistem keamanan jaringan komputer firewall menggunakan shorewall pada PT. indofarma global medika

R Effendi - Jurnal TEKSAGRO, 2020 - journal.lp2stm.or.id
Advances in technology, especially computer networks are very helpful in the field of
information and processing of desired information data without limited space and time by …

Formal approach to detect and resolve anomalies while clustering ABAC policies

MA El Hadj, A Khoumsi, Y Benkaouz… - … on Security and Safety, 2018 - publications.eai.eu
In big data environments with big number of users and high volume of data, we need to
manage the corresponding huge number of security policies. Using Attribute-Based Access …

Efficient security policy management using suspicious rules through access log analysis

M Ait El Hadj, A Khoumsi, Y Benkaouz… - Networked Systems: 7th …, 2019 - Springer
Logs record the events and actions performed within an organization's systems and
networks. Usually, log data should conform with the security policy in use. However, access …

[HTML][HTML] 運用資料探勘技術優化次世代防火牆規則之研究

FM Yang - 2023 - ir.lib.ncu.edu.tw
摘要(中) 自新冠疫情(COVID-19) 席捲全球以來, 不只改變了每個人的工作方式,
同時也加速了企業數位轉型的腳步, 面對大量的雲端網路服務與威脅, 企業的網路安全益趨重要 …

[PDF][PDF] Automata-Based Study of Dynamic Access Control Policies.

A Khoumsi - ICISSP, 2023 - scitepress.org
Access control policies (more briefly: policies) are used to filter accesses to resources. A
policy is usually defined by a table of rules that specify which access requests (more briefly …