標(biāo)題: Titlebook: Cybersecurity in the Age of Smart Societies; Proceedings of the 1 Hamid Jahankhani Conference proceedings 2023 The Editor(s) (if applicable [打印本頁] 作者: CURD 時間: 2025-3-21 17:05
書目名稱Cybersecurity in the Age of Smart Societies影響因子(影響力)
書目名稱Cybersecurity in the Age of Smart Societies影響因子(影響力)學(xué)科排名
書目名稱Cybersecurity in the Age of Smart Societies網(wǎng)絡(luò)公開度
書目名稱Cybersecurity in the Age of Smart Societies網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cybersecurity in the Age of Smart Societies被引頻次
書目名稱Cybersecurity in the Age of Smart Societies被引頻次學(xué)科排名
書目名稱Cybersecurity in the Age of Smart Societies年度引用
書目名稱Cybersecurity in the Age of Smart Societies年度引用學(xué)科排名
書目名稱Cybersecurity in the Age of Smart Societies讀者反饋
書目名稱Cybersecurity in the Age of Smart Societies讀者反饋學(xué)科排名
作者: mastoid-bone 時間: 2025-3-21 23:20 作者: EWER 時間: 2025-3-22 01:47
Statistics for Biology and Healthally point to ISO 31000 risk management. This key exercise to ensure the “known” risks is carried out in a reactive perspective, since not only the risks are known and treated, but also the organization is prepared when one of them materializes. Thus, it is necessary to advance in cyber risk managem作者: sperse 時間: 2025-3-22 04:42
Statistics for Biology and Healthn for the validation of parameters. The methodology known as ENISA was used to filter, select and adjust to the needs of the architecture carried out in this project and was compared with the Hardening methodology. To review and validate the parameters of each one, a test bed environment was designe作者: ethnology 時間: 2025-3-22 11:19
Statistics for Biology and Health of negotiating fair value when pursuing profit while at the same time attempting to balance equality and sustainability of the sector. While the mining sector is of significant value to the economy, there are challenges in managing land administration. This research aims to provide a strategic temp作者: Popcorn 時間: 2025-3-22 16:24
Lei Meng,Ah-Hwee Tan,Donald C. Wunsch IItition and technological advancement. Large corporations have the resources to invest in an expensive Big Data and Analytics infrastructure or platform, however, using business intelligence technologies is a challenging effort for start-ups owing to hefty license costs, the need to create an integra作者: Popcorn 時間: 2025-3-22 17:51
Lei Meng,Ah-Hwee Tan,Donald C. Wunsch IIandemic and the recent global widespread of cybersecurity breaches. The gaps in security operations, due to inconsistency in the availability of cyber security workforce exposes the organisation to the possibility of costly security breaches. Although there are diverse views on the factors responsib作者: 觀點 時間: 2025-3-23 00:18 作者: 宣誓書 時間: 2025-3-23 02:38 作者: JADED 時間: 2025-3-23 07:29
Alexandru-Florian Antonescu,Torsten Braun, such as smartwatches, fitness trackers and smart phones. The number of vulnerabilities exploited has also risen in tandem with the increased sales. The attack vectors have greatly increased due to the connectivity and mass functionality of these devices. The lack of security in smartwatches, marke作者: Mri485 時間: 2025-3-23 13:23 作者: Enthralling 時間: 2025-3-23 15:35
Adaptive Reuse for Urban Food Provision state of California using the public data breach database functioning under the state notification law of data breach. The dataset contains records since January 2012. These records were analysed in order to classify and identify California data breaches by multiple company types, attack vectors an作者: 很是迷惑 時間: 2025-3-23 22:04
Adaptation to Static Environmentsaine have been aided using technology. The Russians have used various types of attacks for various reasons, such as reconnaissance to gather information about Ukraine‘s critical systems. It is critical to be able to profile these types of attacks for identification and other strategies to prevent su作者: 證實 時間: 2025-3-23 23:19
Towards Real World Scheduling Systemsby these networks keeps growing and has become a potential target for criminals seeking to capitalise on its sensitivity and value. Wireless networks also happen to be more vulnerable to attacks compared to wired networks. In the event of such attacks, it becomes really difficult to conduct a digita作者: 不可救藥 時間: 2025-3-24 04:05
Towards Real World Scheduling Systems and governance. Operations governed by smart contracts where bylaws are embedded into code and the decentralised nature of their governance are offering a unique structure to organisations looking for transparency and community engagement. This paper will give an overview of blockchain technologies作者: 我不怕犧牲 時間: 2025-3-24 07:55
Adaptive Semantics Visualizationt as cybersecurity has become a national concern. Cybersecurity involves techniques that protect and control systems, networks, hardware, software, and electronic data from unauthorised access. Developing an effective and innovative defensive mechanism is an urgent requirement as traditional cyberse作者: PLE 時間: 2025-3-24 11:04 作者: 檔案 時間: 2025-3-24 17:22
Studies in Computational Intelligencesition currently for the number of hacker groups in the world. Security experts require even more data and tools to keep up with these cyber threats from Chinese Cyber-Criminals. They need to acquire top strategies to fight back in the warfare involving cybercriminals and defences. Cybersecurity mon作者: 表示問 時間: 2025-3-24 20:34
https://doi.org/10.1007/978-3-030-38877-5lected, even though human error still accounts for a large part of cyber incidents (Gartner, 2022). At the same time there is currently an important generational shift, as Generation Z (Gen Z) is starting to enter the workforce and is said to be soon overtaking millennials. However, Gen Z is said to作者: 沙漠 時間: 2025-3-25 00:21 作者: 在前面 時間: 2025-3-25 06:39
Shyness and Sociability Revisited to communicate anonymously without revealing identifying information. Keeping Internet activity anonymous and private can be beneficial for both legal and illegal applications. Although it is used to evade government censorship, it is also deployed for highly illegal activity. The aim of this paper作者: Scleroderma 時間: 2025-3-25 08:27 作者: 龍卷風(fēng) 時間: 2025-3-25 11:55 作者: 即席演說 時間: 2025-3-25 16:43
Cybersecurity in the Age of Smart Societies978-3-031-20160-8Series ISSN 1613-5113 Series E-ISSN 2363-9466 作者: Introduction 時間: 2025-3-25 21:17
Security Risk Management and Cybersecurity: From the Victim or from the Adversary?,ally point to ISO 31000 risk management. This key exercise to ensure the “known” risks is carried out in a reactive perspective, since not only the risks are known and treated, but also the organization is prepared when one of them materializes. Thus, it is necessary to advance in cyber risk managem作者: Pessary 時間: 2025-3-26 02:28
Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture,n for the validation of parameters. The methodology known as ENISA was used to filter, select and adjust to the needs of the architecture carried out in this project and was compared with the Hardening methodology. To review and validate the parameters of each one, a test bed environment was designe作者: 眨眼 時間: 2025-3-26 05:54
A Critical Review into the Digital Transformation of Land Title Management: The Case of Mining in Z of negotiating fair value when pursuing profit while at the same time attempting to balance equality and sustainability of the sector. While the mining sector is of significant value to the economy, there are challenges in managing land administration. This research aims to provide a strategic temp作者: 數(shù)量 時間: 2025-3-26 08:53
Harnessing Big Data for Business Innovation and Effective Business Decision Making,tition and technological advancement. Large corporations have the resources to invest in an expensive Big Data and Analytics infrastructure or platform, however, using business intelligence technologies is a challenging effort for start-ups owing to hefty license costs, the need to create an integra作者: 小畫像 時間: 2025-3-26 12:37
Building a Resilient Cybersecurity Workforce: A Multidisciplinary Solution to the Problem of High Tandemic and the recent global widespread of cybersecurity breaches. The gaps in security operations, due to inconsistency in the availability of cyber security workforce exposes the organisation to the possibility of costly security breaches. Although there are diverse views on the factors responsib作者: 比賽用背帶 時間: 2025-3-26 18:01 作者: LAVE 時間: 2025-3-26 21:02 作者: 硬化 時間: 2025-3-27 02:20
,Spying on Kids’ Smart Devices: Beware of Security Vulnerabilities!,, such as smartwatches, fitness trackers and smart phones. The number of vulnerabilities exploited has also risen in tandem with the increased sales. The attack vectors have greatly increased due to the connectivity and mass functionality of these devices. The lack of security in smartwatches, marke作者: Verify 時間: 2025-3-27 08:30 作者: GRAZE 時間: 2025-3-27 10:16 作者: 來這真柔軟 時間: 2025-3-27 14:11 作者: 暫停,間歇 時間: 2025-3-27 18:25
Developing a Novel Digital Forensics Readiness Framework for Wireless Medical Networks Using Speciaby these networks keeps growing and has become a potential target for criminals seeking to capitalise on its sensitivity and value. Wireless networks also happen to be more vulnerable to attacks compared to wired networks. In the event of such attacks, it becomes really difficult to conduct a digita作者: 健談的人 時間: 2025-3-27 22:23
Assembly, Deployment and Extension of Blockchain Based Decentralized Autonomous Organizations: A Fr and governance. Operations governed by smart contracts where bylaws are embedded into code and the decentralised nature of their governance are offering a unique structure to organisations looking for transparency and community engagement. This paper will give an overview of blockchain technologies作者: biosphere 時間: 2025-3-28 03:49 作者: 沉著 時間: 2025-3-28 08:11 作者: Overthrow 時間: 2025-3-28 12:42 作者: Enrage 時間: 2025-3-28 16:48 作者: 寬宏大量 時間: 2025-3-28 20:21
Cyber Security Compliance Among Remote Workers,rganizational development. This study seeks to find out how remote employees comply with their organizations’ cybersecurity regulations and policies. The objectives of this research are to investigate strategies organizations use to keep positive cyber security compliance, understand the challenges 作者: 昏迷狀態(tài) 時間: 2025-3-29 00:43 作者: CEDE 時間: 2025-3-29 06:50 作者: 營養(yǎng) 時間: 2025-3-29 10:36 作者: paradigm 時間: 2025-3-29 14:44
A Critical Review into the Digital Transformation of Land Title Management: The Case of Mining in Zresearch for Zimbabwe. Therefore, this research investigates how digital transformation can support mining land title management to create transparency and accountability. From a myriad of available options, this research proposes a technological solution based on Blockchain’s Self-Sovereign Identit作者: 整頓 時間: 2025-3-29 17:03 作者: 仔細(xì)檢查 時間: 2025-3-29 21:34
Building a Resilient Cybersecurity Workforce: A Multidisciplinary Solution to the Problem of High Tand cybersecurity leaders, including the views of experts from the fields of Human Resources (HR) and psychology. This research was conducted as a case study of the two types of Security Operations Centres (SOCs): in-house and Managed Security Service Providers (MSSP), between the months of March an作者: monochromatic 時間: 2025-3-30 00:27 作者: TRUST 時間: 2025-3-30 07:46
IoT-Penn: A Security Penetration Tester for MQTT in the IoT Environment,This paper intended to answer the question of the utility of penetration testing when designing and evaluating an MQTT network. Various attacks were catalogued, designed, and implemented in an application called IoTPenn. These attacks were carried out on a simulated MQTT network, after which the res作者: exhibit 時間: 2025-3-30 11:36 作者: 是剝皮 時間: 2025-3-30 13:18 作者: CODE 時間: 2025-3-30 19:41 作者: 疏忽 時間: 2025-3-31 00:29 作者: Mystic 時間: 2025-3-31 03:26
What Drives Generation Z to Behave Security Compliant? An Extended Analysis Using the Theory of Plaarched in the context of Gen Z. The results conclude that Gen Z has a rather indifferent attitude towards security and generally values convenience much more than security. This can be led back to the lack of security awareness education as opposed to older generations that often experienced a train作者: 范例 時間: 2025-3-31 08:22 作者: 倔強不能 時間: 2025-3-31 09:57
An Analysis of the Dark Web Challenges to Digital Policing, concerning the multi-jurisdictional nature of Dark Web investigations and lack of reliable data and resources while ensuring transparency and accountability. The recommendations proposed in this paper are restricted by certain limitations, therefore, further research is recommended into the field o作者: 破譯密碼 時間: 2025-3-31 15:48
Conference proceedings 2023 and cyber-crime, the 14th ICGS3-22 conference aims to provide attendees withan information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special even作者: photopsia 時間: 2025-3-31 17:42 作者: lavish 時間: 2025-4-1 00:44 作者: Commemorate 時間: 2025-4-1 05:10 作者: Apraxia 時間: 2025-4-1 09:17
Lei Meng,Ah-Hwee Tan,Donald C. Wunsch IIand cybersecurity leaders, including the views of experts from the fields of Human Resources (HR) and psychology. This research was conducted as a case study of the two types of Security Operations Centres (SOCs): in-house and Managed Security Service Providers (MSSP), between the months of March an作者: Mindfulness 時間: 2025-4-1 11:17
Alexandru-Florian Antonescu,Torsten Braun between a consumer and a shop or a bank is now a click away, thanks to the wide access to the internet and the digital presence of the entities. Taking the advantage of easy excess and widespread use of the internet, opportunists and criminals have chosen the digital path to materialize their evil 作者: 檔案 時間: 2025-4-1 17:12 作者: 文字 時間: 2025-4-1 20:11
Adaptation to Static Environmentsee, suitable for research, and widely available. Different classification algorithms will be used to train the proposed predictors, and the most reliable and accurate model will be chosen. This study emphasizes the importance of better understanding well known Russian hacker groups, which could lead作者: Confirm 時間: 2025-4-2 01:51
Towards Real World Scheduling Systemsework for Digital Forensics Readiness (DFR) for wireless medical networks. The paper, therefore, makes a novel contribution to the field of digital forensics. It suggests a more streamlined, robust, and decentralised framework that is partially underpinned by blockchain technology at the evidence ma作者: single 時間: 2025-4-2 03:16