派博傳思國際中心

標(biāo)題: Titlebook: Blockchain and Other Emerging Technologies for Digital Business Strategies; Hamid Jahankhani,David V. Kilpin,Stefan Kendziersk Book 2022 T [打印本頁]

作者: CULT    時(shí)間: 2025-3-21 16:22
書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies影響因子(影響力)




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies影響因子(影響力)學(xué)科排名




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies網(wǎng)絡(luò)公開度




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies被引頻次




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies被引頻次學(xué)科排名




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies年度引用




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies年度引用學(xué)科排名




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies讀者反饋




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies讀者反饋學(xué)科排名





作者: declamation    時(shí)間: 2025-3-21 20:16
Advanced Sciences and Technologies for Security Applicationshttp://image.papertrans.cn/b/image/189225.jpg
作者: Vsd168    時(shí)間: 2025-3-22 00:57

作者: 填滿    時(shí)間: 2025-3-22 07:13

作者: Ergots    時(shí)間: 2025-3-22 10:04

作者: 咯咯笑    時(shí)間: 2025-3-22 16:42

作者: Endometrium    時(shí)間: 2025-3-22 19:45
Innovation policy for mobile media,lder patient group suffers from Mild Cognitive Impairment and dementia. According to the World Health Organization, currently 55 million people worldwide suffer from dementia only. The projection is 75 million in 2030 and 132 million by 2050 (WHO, 2021). Mild Cognitive Impairment is often the first
作者: 600    時(shí)間: 2025-3-22 21:47
https://doi.org/10.1007/b139034ganisations to reconsider their processes, their business model, and their ways of working. However, whilst many organisations have embarked on a digital transformation, cyber resilience is not always considered, causing many transformations to lead to greater vulnerabilities and a higher exposure t
作者: AVANT    時(shí)間: 2025-3-23 03:32

作者: Ovulation    時(shí)間: 2025-3-23 06:06

作者: Canvas    時(shí)間: 2025-3-23 12:37

作者: voluble    時(shí)間: 2025-3-23 17:27
Innovation policy for mobile media,d upon the rise of technology, competitive market, and legal and regulatory compliances. Teichert (Acta Univ Agriculturae Silviculturae Mendelianae Brunensis 67:1673–1687, [.]) observe this condition as the reason for forcing the business plans and policies of organizations to adapt to technological
作者: DRAFT    時(shí)間: 2025-3-23 20:50

作者: insurrection    時(shí)間: 2025-3-23 22:44

作者: Exclude    時(shí)間: 2025-3-24 05:52
Blockchain and Other Emerging Technologies for Digital Business Strategies978-3-030-98225-6Series ISSN 1613-5113 Series E-ISSN 2363-9466
作者: 音樂學(xué)者    時(shí)間: 2025-3-24 07:47
Cybersecurity Challenges in Small and Medium Enterprise (SMEs),eir reach, and thereby improving value producing opportunities. It also brought the small businesses additional responsibilities of having to deal with the security risks and threats which are ever-present on the digital platform. This chapter aims to review and analyse the cybersecurity risks in sm
作者: Optometrist    時(shí)間: 2025-3-24 12:43

作者: Carcinoma    時(shí)間: 2025-3-24 17:00
Video Camera in the Ambient Assisted Living System. Health Versus Privacy,lder patient group suffers from Mild Cognitive Impairment and dementia. According to the World Health Organization, currently 55 million people worldwide suffer from dementia only. The projection is 75 million in 2030 and 132 million by 2050 (WHO, 2021). Mild Cognitive Impairment is often the first
作者: Presbycusis    時(shí)間: 2025-3-24 23:01

作者: CORE    時(shí)間: 2025-3-25 00:34

作者: 機(jī)構(gòu)    時(shí)間: 2025-3-25 07:20
Emerging Technologies: Blockchain and Smart Contracts,ain technology and Smart Contracts. A discussion is made on nodes, consensus mechanisms, digital signatures and cryptographic hashes, types of blockchains, Ethereum, and Smart Contracts benefits.After that, it explores the distributed ledger technology (DLT) and blockchain as a subset of DLT in grea
作者: 偏離    時(shí)間: 2025-3-25 07:50
An Investigation into How Smartphones Can Be Secured Against MiTM Attacks: Financial Sector,rity and are conceivably the most productive types of cyberattacks utilised today. The increasing use of personal devices like smartphones connecting to the internet via Wi-Fi has made wireless attacks on users more crucial. The cyber adversary becomes a “middleman” between two targets to intercept
作者: Legion    時(shí)間: 2025-3-25 12:27
Digital Transformation, Leadership, and Markets,d upon the rise of technology, competitive market, and legal and regulatory compliances. Teichert (Acta Univ Agriculturae Silviculturae Mendelianae Brunensis 67:1673–1687, [.]) observe this condition as the reason for forcing the business plans and policies of organizations to adapt to technological
作者: SAGE    時(shí)間: 2025-3-25 16:05
Challenges and Opportunities of Autonomous Cyber Defence (ACyD) Against Cyber Attacks,o generated threats and how these threats needs to be dealt with. This research focuses on the use of Artificial Intelligence (AI), Machine learning (ML) and Deep learning (DL) to mitigate auto-generated cyber attacks which are hard to track and neutralise. Hence, the key issue that the research pro
作者: BARGE    時(shí)間: 2025-3-25 23:24

作者: 蝕刻術(shù)    時(shí)間: 2025-3-26 00:21
Book 2022nationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills..
作者: 完成才會征服    時(shí)間: 2025-3-26 07:33

作者: 說笑    時(shí)間: 2025-3-26 08:36
Artificial Intelligence Based Malicious Traffic Detection,proposed model is tested using two different datasets, a dataset created in a virtual lab environment, and an IoT-23 dataset. The performance of the proposed AI model is tested on the metrics of ‘a(chǎn)ccuracy’ and ‘loss’. The model performed well in distinguishing the network traffic on both the dataset
作者: 堅(jiān)毅    時(shí)間: 2025-3-26 14:21
An Examination of How the Interaction Between Senior IT Managers and C-Level Executives Impacts on at strong leadership was required to make certain that cyber resilience was included in digital transformation projects. In addition to this it must be seen and accepted that Cyber Resilience is an organizational issue for there to be a real impact. The relationship between the board and their view
作者: 忍耐    時(shí)間: 2025-3-26 19:33

作者: Benzodiazepines    時(shí)間: 2025-3-27 00:03
Digital Transformation, Leadership, and Markets,reas to consider while an organization plan on a digital transformation project as process transformation, business model transformation, domain transformation, cultural/organizational transformation. The benefit of a successful digital transformation according to the author is improved processes, f
作者: 攤位    時(shí)間: 2025-3-27 05:06

作者: 節(jié)省    時(shí)間: 2025-3-27 08:03
Secure Deployment of IOT Devices,study, we tried to educate normal users to securely deploy IoT devices. To achieve this goal, we have provided a set of best practices collected from existing standard frameworks. We have demonstrated the implementation of these security measures in two different scenarios using various network devi
作者: Digitalis    時(shí)間: 2025-3-27 13:28
1613-5113 ademia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills..978-3-030-98227-0978-3-030-98225-6Series ISSN 1613-5113 Series E-ISSN 2363-9466
作者: thrombosis    時(shí)間: 2025-3-27 17:07

作者: nocturia    時(shí)間: 2025-3-27 19:38

作者: expeditious    時(shí)間: 2025-3-27 23:37

作者: 遺產(chǎn)    時(shí)間: 2025-3-28 03:24

作者: 過份艷麗    時(shí)間: 2025-3-28 09:15
Innovation policy for mobile media, with the sole aim of persistently and autonomously defending all cyber physical systems against cyber attacks. The use of ACyD in cyber defence is a relatively new research area that the author hopes will gain grounds in the future.
作者: Tremor    時(shí)間: 2025-3-28 12:54

作者: 出汗    時(shí)間: 2025-3-28 17:07

作者: 竊喜    時(shí)間: 2025-3-28 21:02





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
化德县| 田东县| 黄龙县| 桑日县| 林周县| 祁阳县| 富阳市| 民勤县| 山阳县| 运城市| 安远县| 沂南县| 西充县| 拜城县| 呼伦贝尔市| 柳林县| 凤阳县| 台州市| 陆河县| 陆丰市| 浦东新区| 奉贤区| 眉山市| 大同市| 巴彦淖尔市| 宁都县| 马边| 扶绥县| 太湖县| 区。| 鄢陵县| 绥化市| 大理市| 泗水县| 盐源县| 长春市| 牡丹江市| 洪泽县| 安宁市| 铁岭县| 固阳县|