Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 9,910

Firewalls, IDS and IPS - Temple University

https://community.mis.temple.edu/mis5214sec702spring2021/files/2021/02/06_S21_MIS5214_Unit6_Firewalls-IDS-IPS.pdf

You may use app.diagrams.net, Visio, or Cyber Security Evaluation Tool (available here: CSET) CSET’s Diagram Tool, to draw the logical network diagram of the information system infrastructure Use appropriate network symbols and annotation in your architectural diagram, include:

central-control - Temple University

https://cis.temple.edu/~tug29203/20-5590/lectures/central-control.pdf

If a Switch finds a shorter path to the Controller, way authentication with it before advertising route. Therefore, the minimum spanning the Controller, hop-by-hop as each Switch Authentication is done using the preconfigured sure that a misbehaving node cannot masquerade or another Switch. If authentication is successful, ates an encrypted connection with the Controller communication between ...

Internal Control Using COBIT 5 - Temple University

https://community.mis.temple.edu/mis5202online2016/files/2016/03/Internal-Control-Using-COBIT-5_whp_eng_0316.pdf

Internal Control in COBIT In COBIT® terms, a control can be any enabler that supports the achievement of one or more objectives (control objectives). These objectives are the desired result or purpose from the implementation of a relevant process, practice, principle, tool, organizational unit, symbol or other capability. A control practice is a key mechanism that supports the achievement of ...

CENTAUR WARFIGHTING: THE FALSE CHOICE OF HUMANS VS. AUTOMATION - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf

Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...

Lecture 6 – Chapter 3 TCP flow and congestion control

https://cis.temple.edu/~tug29203/19spring-5617/lectures/ch3-3.pdf

Lecture 6 – Chapter 3 TCP flow and congestion control CIS 5617, Fall 2019 Anduo Wang Based on Slides created by JFK/KWR

Mutual Risk Sharing and Fintech: The Case of Xiang Hu Bao

https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/XiangHuBao-main-2022-03-23.pdf

The significant progress in information technologies promotes new venues in risk sharing and risk management practices (OECD, 2017). Just as peer-to-peer (P2P) lending platforms connected un-or under-financed borrowers to lenders, emerging fintech platforms can also be leveraged to reach traditionally un-insured or under-insured customers.2 This is exemplified by Xiang Hu Bao (XHB, meaning ...

Intrinsic Disorder and Protein Function A. Keith Dunker, J. David ...

https://dabi.temple.edu/external/zoran/papers/Dunker_TPT.pdf

For ordered protein, the ensemble members all have the same time-averaged canonical set of Ramachandran angles along their backbones. For intrinsically disordered protein, the ensemble members have different (and typically dynamic) Ramachandran angles. Such disorder has been characterized by a variety of methods including x-ray crystallography, NMR spectroscopy, CD spectroscopy, and protease ...

Review Summary Generation in Online Systems: Frameworks for Supervised ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/WENJUNJIANG2021TWeb.pdf

In online systems, including e-commerce platforms, many users resort to the reviews or comments generated by previous consumers for decision making, while their time is limited to deal with many reviews. Therefore, a review summary, which contains all important features in user-generated reviews, is expected. In this paper, we study “how to generate a comprehensive review summary from a ...