派博傳思國際中心

標(biāo)題: Titlebook: Developments and Advances in Defense and Security; Proceedings of MICRA álvaro Rocha,Robson Pacheco Pereira Conference proceedings 2020 Spr [打印本頁]

作者: 淹沒    時間: 2025-3-21 20:00
書目名稱Developments and Advances in Defense and Security影響因子(影響力)




書目名稱Developments and Advances in Defense and Security影響因子(影響力)學(xué)科排名




書目名稱Developments and Advances in Defense and Security網(wǎng)絡(luò)公開度




書目名稱Developments and Advances in Defense and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Developments and Advances in Defense and Security被引頻次




書目名稱Developments and Advances in Defense and Security被引頻次學(xué)科排名




書目名稱Developments and Advances in Defense and Security年度引用




書目名稱Developments and Advances in Defense and Security年度引用學(xué)科排名




書目名稱Developments and Advances in Defense and Security讀者反饋




書目名稱Developments and Advances in Defense and Security讀者反饋學(xué)科排名





作者: Injunction    時間: 2025-3-21 20:37
Smart Innovation, Systems and Technologieshttp://image.papertrans.cn/d/image/270126.jpg
作者: 開頭    時間: 2025-3-22 00:49

作者: Binge-Drinking    時間: 2025-3-22 06:47

作者: 斗志    時間: 2025-3-22 12:44

作者: 招惹    時間: 2025-3-22 15:04
G. Frerichs,G. Arends,H. Z?rniguse also leads to a general increase in cybercrime concerns as well as the number of users’ victims of this permanent threat. This reality is also very present in Portugal where there is a sense of lack of control and combat of this kind of cyber-threats. In this context, it is important to know som
作者: 招惹    時間: 2025-3-22 20:14
G. Frerichs,G. Arends,H. Z?rnigse days, three ways to mitigate such attacks stand out: Focus based on awareness, based on blacklists, and based on machine learning (ML). However, in the last days, Deep Learning (DL) has emerged as one of the most efficient techniques of machine learning. Thus, this systematic literature review ha
作者: 觀點(diǎn)    時間: 2025-3-22 22:06

作者: 易彎曲    時間: 2025-3-23 05:14

作者: 優(yōu)雅    時間: 2025-3-23 07:25
G. Frerichs,G. Arends,H. Z?rnigve a closer look at security systems. From analog systems to the fourth generation, many changes and evolutions occurred. This makes possible to question whether mobile networks have sufficiently secure systems, and what vulnerabilities we should be aware of. Due to the widespread risk of attacks on
作者: Protein    時間: 2025-3-23 13:18

作者: 招人嫉妒    時間: 2025-3-23 14:08

作者: monopoly    時間: 2025-3-23 21:59

作者: Armada    時間: 2025-3-24 00:43

作者: headlong    時間: 2025-3-24 05:20

作者: 努力趕上    時間: 2025-3-24 07:42
https://doi.org/10.1007/978-3-030-98331-4s of military strategy, personal and institutional competencies that leaders must develop, and the leadership styles of the Full Range Leadership Model (FRLM). The model applied in a first approximation to the Ecuadorian Armed Forces uses the Multifactor Leadership Questionnaire (MLQ) to determine t
作者: Anonymous    時間: 2025-3-24 13:59
https://doi.org/10.1007/978-981-13-9155-2MICRADS 2019; Information and Communication Technology in Education; Simulation and Computer Vision in
作者: analogous    時間: 2025-3-24 15:39
978-981-13-9157-6Springer Nature Singapore Pte Ltd. 2020
作者: expdient    時間: 2025-3-24 22:27
Developments and Advances in Defense and Security978-981-13-9155-2Series ISSN 2190-3018 Series E-ISSN 2190-3026
作者: FUSC    時間: 2025-3-25 01:30

作者: 殘暴    時間: 2025-3-25 05:41
G. Frerichs,G. Arends,H. Z?rnig be able to verify the conformity between what is in the memory and the flow rules set by the controllers without overusing the system resources. A trusted execution environment is also proposed to improve the security of the auditing processes.
作者: 匍匐    時間: 2025-3-25 09:51

作者: neuron    時間: 2025-3-25 14:45
Micro-controlled EOG Device for Track and Control Military Applicationsnd also for soldier monitoring. A proof of concept to act and be tested as mouse pointer was implemented with reduced circuitry and PIC microcontroller in order to achieve low cost and low profile platform. Experimental results are shown to validate a prototype of the proposed system.
作者: deficiency    時間: 2025-3-25 18:39

作者: 無節(jié)奏    時間: 2025-3-25 20:49

作者: decipher    時間: 2025-3-26 00:42
G. Frerichs,G. Arends,H. Z?rnig mobile communications, telecommunication companies are increasingly emphasizing telecommunication security technologies specifically in fourth generation (4G) technology, in order to ensure the main security functions to provide an efficient service to its customers.
作者: 概觀    時間: 2025-3-26 07:40
G. Frerichs,G. Arends,H. Z?rnigcoordinates of interest. In light of the above, it is suggested that this kind of study provides a low-cost surveillance and reconnaissance alternative to existing advanced systems such as satellites for countries that do not have this type of technology, as is the case of Ecuador.
作者: expound    時間: 2025-3-26 11:40
Hagers Handbuch der Pharmazeutischen Praxisck surface. To ensure the effectiveness of the proposed countermeasures, proofs of concept were developed and tested in a controlled environment with a set of anti-instrumentation techniques. Finally, we evaluated the performance impact of using such countermeasures.
作者: 碎石    時間: 2025-3-26 14:32
G. Frerichs,G. Arends,H. Z?rnigstricted area, resulting in a faster or slower movement that will improve the tracking of a moving target by delivering real-time object monitoring information to the user in order to take some action based on this information.
作者: 激怒    時間: 2025-3-26 17:28

作者: –scent    時間: 2025-3-26 23:14

作者: Legion    時間: 2025-3-27 03:04

作者: 除草劑    時間: 2025-3-27 08:03

作者: ear-canal    時間: 2025-3-27 10:27

作者: 仲裁者    時間: 2025-3-27 16:50
Mobile Communication Systems: Evolution and Security mobile communications, telecommunication companies are increasingly emphasizing telecommunication security technologies specifically in fourth generation (4G) technology, in order to ensure the main security functions to provide an efficient service to its customers.
作者: 苦惱    時間: 2025-3-27 18:11
Toward the Development of Surveillance and Reconnaissance Capacity in Ecuador: Geolocation System focoordinates of interest. In light of the above, it is suggested that this kind of study provides a low-cost surveillance and reconnaissance alternative to existing advanced systems such as satellites for countries that do not have this type of technology, as is the case of Ecuador.
作者: Arroyo    時間: 2025-3-28 00:01
Conference proceedings 2020e Military Engineering Institute, Rio de Janeiro, Brazil, from 8 to 10th May 2019. It covers a variety of topics in systems, communication and defense; strategy and political-administrative vision in defense; and engineering and technologies applied to defense. Given its scope, it offers a valuable
作者: Mhc-Molecule    時間: 2025-3-28 02:45
G. Frerichs,G. Arends,H. Z?rniguser may not sign out from some services that he or she was using. This situation may lead to information security attacks. Also, we propose a solution that can be implemented on the browser to ensure a safe sign-out process.
作者: Fibrinogen    時間: 2025-3-28 06:29

作者: 粗糙    時間: 2025-3-28 12:30
G. Frerichs,G. Arends,H. Z?rnigat the Portuguese’s concerns about cybercrime are in line with the average of the European citizens, although the percentage of Portuguese experienced these attacks is, for now, below average. Based on these results, it is possible to identify some public policies that aim to mitigate this phenomeno
作者: 浮雕寶石    時間: 2025-3-28 17:48
G. Frerichs,G. Arends,H. Z?rnige been able to classify the Deep Learning algorithms selected in each solution, which yielded that the most commonly used are the deep neural network (DNN) and convolutional neural network (CNN), among other fundamental data.
作者: 粗魯?shù)娜?nbsp;   時間: 2025-3-28 20:16

作者: Mets552    時間: 2025-3-29 00:24
https://doi.org/10.1007/978-3-662-36330-0ions using different hostility and weapon range distributions. The results demonstrated that the proposed model is able to significantly improve the number of UAVs that are able to complete the mission without being hit by any threat. In addition, the proposed approach for calculating the goal posit
作者: indifferent    時間: 2025-3-29 06:39
G. Frerichs,G. Arends,H. Z?rnigsults allowed to demonstrate certain behavior of air pollutants around the city, such as the increased air pollution levels during daylight hours. Similarly, we discovered that the presence of particulate material PM10 and PM2.5 is directly related to the increase of the Air Quality Index for the ci
作者: 兩棲動物    時間: 2025-3-29 10:41
Single Sign-on Implementation: Leveraging Browser Storage for Handling Tabbed Browsing Sign-outsuser may not sign out from some services that he or she was using. This situation may lead to information security attacks. Also, we propose a solution that can be implemented on the browser to ensure a safe sign-out process.
作者: 可忽略    時間: 2025-3-29 12:39
Cybernetic Dependency Capacityany country, within the scope of a cyberwar, is very influenced by the dependence of this country of their information society. As a major development of the IT society in one country will not make it theoretically victorious in a cyberwarfare with a country less IT developed. This fact, which is ap
作者: 異端    時間: 2025-3-29 16:35
Portuguese Concerns and Experience of Specific Cybercrimes: A Benchmarking with European Citizensat the Portuguese’s concerns about cybercrime are in line with the average of the European citizens, although the percentage of Portuguese experienced these attacks is, for now, below average. Based on these results, it is possible to identify some public policies that aim to mitigate this phenomeno
作者: Nonporous    時間: 2025-3-29 20:53
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Litee been able to classify the Deep Learning algorithms selected in each solution, which yielded that the most commonly used are the deep neural network (DNN) and convolutional neural network (CNN), among other fundamental data.
作者: Hemoptysis    時間: 2025-3-30 00:23

作者: Charitable    時間: 2025-3-30 07:46
Evaluating Trail Formation in Collaborative UAV Networks with Lethal Threatsions using different hostility and weapon range distributions. The results demonstrated that the proposed model is able to significantly improve the number of UAVs that are able to complete the mission without being hit by any threat. In addition, the proposed approach for calculating the goal posit
作者: 制造    時間: 2025-3-30 10:52

作者: 辭職    時間: 2025-3-30 15:26
Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworkseats. In part, this owes the ability of malware developers to promptly respond to the emergence of new security solutions by developing artifacts to detect and avoid them. In this work, we present three countermeasures to mitigate recent mechanisms used by malware to detect analysis environments. Am
作者: VEST    時間: 2025-3-30 19:20





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
南充市| 尼勒克县| 清水县| 玉门市| 将乐县| 岳阳县| 乌鲁木齐县| 贵德县| 常熟市| 咸宁市| 灵寿县| 灵山县| 洛扎县| 肃宁县| 珲春市| 三门峡市| 白银市| 壶关县| 抚宁县| 榆社县| 牙克石市| 涞水县| 清水河县| 九龙城区| 齐齐哈尔市| 万盛区| 柳林县| 太白县| 个旧市| 新乡市| 磐安县| 多伦县| 高密市| 喀喇沁旗| 河南省| 旬阳县| 龙海市| 师宗县| 绥芬河市| 日土县| 湘乡市|