標題: Titlebook: AISMA-2024: International Workshop on Advanced Information Security Management and Applications; Maria Lapina,Zahid Raza,Mikhail Babenko C [打印本頁] 作者: 小客車 時間: 2025-3-21 18:58
書目名稱AISMA-2024: International Workshop on Advanced Information Security Management and Applications影響因子(影響力)
書目名稱AISMA-2024: International Workshop on Advanced Information Security Management and Applications影響因子(影響力)學科排名
書目名稱AISMA-2024: International Workshop on Advanced Information Security Management and Applications網絡公開度
書目名稱AISMA-2024: International Workshop on Advanced Information Security Management and Applications網絡公開度學科排名
書目名稱AISMA-2024: International Workshop on Advanced Information Security Management and Applications被引頻次
書目名稱AISMA-2024: International Workshop on Advanced Information Security Management and Applications被引頻次學科排名
書目名稱AISMA-2024: International Workshop on Advanced Information Security Management and Applications年度引用
書目名稱AISMA-2024: International Workshop on Advanced Information Security Management and Applications年度引用學科排名
書目名稱AISMA-2024: International Workshop on Advanced Information Security Management and Applications讀者反饋
書目名稱AISMA-2024: International Workshop on Advanced Information Security Management and Applications讀者反饋學科排名
作者: HACK 時間: 2025-3-21 20:34 作者: 背信 時間: 2025-3-22 01:29
Analysing Information Security Risks When Remotely Connecting to the Web Interface,ng qualitative and quantitative analysis for a deep understanding of information security risks. The results obtained serve as a guide for organizations to improve risk management methods when working with remote connections to web interfaces. Article concluded with recommendations for minimizing se作者: KIN 時間: 2025-3-22 07:28
A Safe and Secure Online System for Bidding Using Blockchain Technology,uction System, now becomes vitally important. Overcoming the deficits of traditional auctions, such as physical location, timing and travel, a finite number of participants, etc. a support is now expressed to have an online format. Blockchain and smart contracts can now be used as a ground breaking 作者: 開始從未 時間: 2025-3-22 10:52 作者: 滑動 時間: 2025-3-22 13:44 作者: 使激動 時間: 2025-3-22 19:39
Business Infrastructure Resilience to IT Infrastructure Risks and Its Modeling, IT ecosystem, as well as structural schemes of modeling, are proposed and investigated. The model is based on the Cobb-Douglas type function, the adequacy functional of the least squares method and classical (“hard”) and non-classical (“soft”) approaches and computational methods. Scientific and pr作者: 無聊點好 時間: 2025-3-23 00:26
Analysis of Routing Protocols in MANET Networks,ks. The results obtained can be useful in the design of mobile applications, emergency communication systems, transport management and other areas where the efficient operation of wireless networks is important.作者: 要塞 時間: 2025-3-23 02:27
Biometric Two-Factor Authentication Method Using Liveliness Detection with Human Presence IndicatorThe cornerstone of software and hardware tools for UAA protection lies in identification (verifying identity) and authentication (confirming authenticity) procedures for users. The most prevalent user authentication method involves using specific information (password), which is user-friendly but al作者: Allergic 時間: 2025-3-23 07:23 作者: 商談 時間: 2025-3-23 13:21 作者: 微生物 時間: 2025-3-23 14:05 作者: 合法 時間: 2025-3-23 21:19 作者: irreparable 時間: 2025-3-24 01:31
Vom Klassendiagramm zum Programm,uction System, now becomes vitally important. Overcoming the deficits of traditional auctions, such as physical location, timing and travel, a finite number of participants, etc. a support is now expressed to have an online format. Blockchain and smart contracts can now be used as a ground breaking 作者: 無政府主義者 時間: 2025-3-24 04:48
Vom Klassendiagramm zum Programm,L injection risks. Recommendations include regular software updates, employee training, and penetration testing to bolster security. Paper underscores the necessity of employing various protection methods to safeguard information systems comprehensively. By integrating multiple layers of defense, or作者: unstable-angina 時間: 2025-3-24 08:57 作者: 泥沼 時間: 2025-3-24 11:22
Grundkurs Software-Entwicklung mit C++ IT ecosystem, as well as structural schemes of modeling, are proposed and investigated. The model is based on the Cobb-Douglas type function, the adequacy functional of the least squares method and classical (“hard”) and non-classical (“soft”) approaches and computational methods. Scientific and pr作者: finale 時間: 2025-3-24 15:11
Grundlagen der Software-Entwicklungks. The results obtained can be useful in the design of mobile applications, emergency communication systems, transport management and other areas where the efficient operation of wireless networks is important.作者: 無孔 時間: 2025-3-24 21:27
https://doi.org/10.1007/978-3-8348-9022-1The cornerstone of software and hardware tools for UAA protection lies in identification (verifying identity) and authentication (confirming authenticity) procedures for users. The most prevalent user authentication method involves using specific information (password), which is user-friendly but al作者: nullify 時間: 2025-3-25 02:13
Technology for Assessing the Readiness of Information Security Specialists in the System of Continuing models for the implementation of education in the field of information security often provide a traditional solution to the task at hand, and cannot provide a comprehensive solution to the root causes of the shortage of professional skills. Gamification as an education tool aims to increase the 作者: Aphorism 時間: 2025-3-25 04:29
Access Authentication and Key Distribution Using Physically Unclonable Functions, with SHA-256 as ausing superlattices based on physically unclonable functions are presented. Also presented is an approximate algorithm for software implementation of the presented SHA-256 example. The use of physically unclonable SLP grid functions can make the system more resistant to various types of attacks, inc作者: Institution 時間: 2025-3-25 08:06 作者: Glaci冰 時間: 2025-3-25 14:24
Analysing Information Security Risks When Remotely Connecting to the Web Interface,ns regarding the threats faced by organizations. This article provides a thorough analysis of information security risks arising from remote connection to web interfaces using ISO and FAIR methodologies, by using expert method and risk calculation. By applying ISO/IEC 27005 and FAIR methodologies, t作者: 口訣法 時間: 2025-3-25 15:48 作者: incisive 時間: 2025-3-25 20:33
Theoretical Framework for Blockchain Secured Predictive Maintenance Learning Model Using Digital Two obtain deeper insights into the system and solve the most difficult problems faster and more affordably. Blockchain technology is a developing and exciting technology that has the potential to offer DTs monitoring capabilities, strengthening security and enhancing DTs’ transparency, dependability,作者: paleolithic 時間: 2025-3-26 02:59
Advancements in Sybil Attack Detection: A Comprehensive Survey of Machine Learning-Based Approachese network, achieving security becomes critical. Ensuring security is also challenging because most sensors are deployed in remote areas, making them vulnerable to many security attacks. Sybil attacks are one of the most destructive attacks. Security against Sybil attackers can be attained by impleme作者: 打火石 時間: 2025-3-26 04:32
,Guaranteed Output Delivery with?More than 1/3 of?Malicious Corruption for?Client Server MPC Protoconst the malicious adversary corrupting up to all . parties but one is possible, but the more strict assumption about the corruption threshold . results in more efficient protocols. The highly efficient framework of Dalskov, Escudero, and Nof (ACM CCS’22) allows to securely compute any circuit over a作者: MAL 時間: 2025-3-26 11:30
Methods of Safe Processing of User-Entered Information in Information Systems,ghts the exponential growth of data types and volumes in information systems, emphasizing the consequent rise in vulnerabilities exploited by attackers. Common attack methods like SQL injection, cross-site scripting, and buffer over-flow are discussed alongside the risks posed by inadequate user tra作者: 共同給與 時間: 2025-3-26 14:28
Comparative Analysis of Methods for Assessing Confidence in the Information Security Audit Process,er of shortcomings that lead to the impossibility of implementing the process of assessing confidence in the information security audit process at any time due to the high cost of effort and resources for the organization and constant maintenance of the confidence assessment process, as well as due 作者: 細節(jié) 時間: 2025-3-26 18:31
Using User Profiles for Dynamic Correction of Phishing Attack Response Scenarios,rios for responding to phishing attacks. The analysis of phishing attacks and factors affecting the susceptibility of information system users to such attacks is carried out. The main ways of collecting indicators of compromise are described. It is shown that taking into account the psychological ch作者: 辯論的終結 時間: 2025-3-26 21:47 作者: 夸張 時間: 2025-3-27 03:15 作者: 哀求 時間: 2025-3-27 09:13
Safety of Unmanned Systems,ating, consulting, establishing the context, and assessing, evaluating, treating, monitoring and reviewing risk. This process is undertaken to provide assurances that the risks associated with the operation of unmanned aircraft systems have been managed to acceptable levels. Active efforts should be作者: 類人猿 時間: 2025-3-27 12:00
Analysis of Routing Protocols in MANET Networks, ad hoc networks such as B.A.T.M.A.N, BMX7, OLSRv1, Babel and provides a detailed analysis of their characteristics, advantages and disadvantages. To empirically evaluate performance, tests were carried out in a network simulator. The results of the study allow us to draw conclusions about the effec作者: lambaste 時間: 2025-3-27 17:01 作者: Mosaic 時間: 2025-3-27 18:05 作者: 楓樹 時間: 2025-3-27 22:52 作者: 狂熱語言 時間: 2025-3-28 05:58
Biometric Two-Factor Authentication Method Using Liveliness Detection with Human Presence Indicatorincluded. However, given the rising number of assaults on these tools, it‘s crucial to combine optical image recognition, leveraging neural network technologies, with the ascertainment of a live individual‘s traits through thermal imaging. This necessitates the utilization of existing biometric data作者: Suggestions 時間: 2025-3-28 07:57
https://doi.org/10.1007/978-3-031-72171-7Data Engineering; Computational Intelligence; Information security,; AI model training in information s作者: Lymphocyte 時間: 2025-3-28 11:19
978-3-031-72170-0The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: 條街道往前推 時間: 2025-3-28 14:34 作者: 合唱隊 時間: 2025-3-28 19:24
Vom Klassendiagramm zum Programm,using superlattices based on physically unclonable functions are presented. Also presented is an approximate algorithm for software implementation of the presented SHA-256 example. The use of physically unclonable SLP grid functions can make the system more resistant to various types of attacks, inc作者: condone 時間: 2025-3-29 01:12
Grundkurs Software-Engineering mit UMLts can lead to serious consequences, such as leakage of confidential information, disruption of services and systems, as well as financial losses. In this regard, this study developed a framework for describing security incidents. During the development process, we analyzed data on alerting, analysi作者: 向下五度才偏 時間: 2025-3-29 07:03
Umfeld der Software-Entwicklung,ns regarding the threats faced by organizations. This article provides a thorough analysis of information security risks arising from remote connection to web interfaces using ISO and FAIR methodologies, by using expert method and risk calculation. By applying ISO/IEC 27005 and FAIR methodologies, t作者: 分期付款 時間: 2025-3-29 08:41 作者: 束以馬具 時間: 2025-3-29 14:28 作者: Indicative 時間: 2025-3-29 16:48
Grundkurs Software-Engineering mit UMLe network, achieving security becomes critical. Ensuring security is also challenging because most sensors are deployed in remote areas, making them vulnerable to many security attacks. Sybil attacks are one of the most destructive attacks. Security against Sybil attackers can be attained by impleme作者: Ardent 時間: 2025-3-29 20:16 作者: absolve 時間: 2025-3-30 00:59 作者: tympanometry 時間: 2025-3-30 06:58
Vom Klassendiagramm zum Programm,er of shortcomings that lead to the impossibility of implementing the process of assessing confidence in the information security audit process at any time due to the high cost of effort and resources for the organization and constant maintenance of the confidence assessment process, as well as due 作者: 尾巴 時間: 2025-3-30 11:25 作者: multiply 時間: 2025-3-30 14:28
Umfeld der Software-Entwicklung,. This comprehensive survey article analyzes and contrasts the stress levels reported by students and employees, employing a machine learning approach. By harnessing the capabilities of ML techniques, this study delves into the multifaceted factors influencing stress within these distinct cohorts. T作者: 饒舌的人 時間: 2025-3-30 20:22 作者: 羞辱 時間: 2025-3-30 23:12
https://doi.org/10.1007/978-3-8348-9022-1ating, consulting, establishing the context, and assessing, evaluating, treating, monitoring and reviewing risk. This process is undertaken to provide assurances that the risks associated with the operation of unmanned aircraft systems have been managed to acceptable levels. Active efforts should be作者: 軟弱 時間: 2025-3-31 02:20
Grundlagen der Software-Entwicklung ad hoc networks such as B.A.T.M.A.N, BMX7, OLSRv1, Babel and provides a detailed analysis of their characteristics, advantages and disadvantages. To empirically evaluate performance, tests were carried out in a network simulator. The results of the study allow us to draw conclusions about the effec作者: 奴才 時間: 2025-3-31 07:19 作者: 用不完 時間: 2025-3-31 12:20 作者: 火花 時間: 2025-3-31 16:24
https://doi.org/10.1007/978-3-8348-9022-1lassification of program code from the point of view of fuzzing is considered, the principles by which the code can be attributed to one or another group are described, which contributes to more effective vulnerability detection. Then the article discusses the application of fuzzing. The object of f作者: Anonymous 時間: 2025-3-31 17:51
https://doi.org/10.1007/978-3-8348-9022-1included. However, given the rising number of assaults on these tools, it‘s crucial to combine optical image recognition, leveraging neural network technologies, with the ascertainment of a live individual‘s traits through thermal imaging. This necessitates the utilization of existing biometric data作者: insincerity 時間: 2025-4-1 01:37
Maria Lapina,Zahid Raza,Mikhail BabenkoIncludes recent research on information security management and applications.Is proceedings of the AISMA-2024: International Workshop on Advanced in Information Security Management and Applications.Wr作者: 同步左右 時間: 2025-4-1 05:08
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/b/image/167098.jpg作者: 寵愛 時間: 2025-4-1 07:37
AISMA-2024: International Workshop on Advanced Information Security Management and Applications978-3-031-72171-7Series ISSN 2367-3370 Series E-ISSN 2367-3389