標(biāo)題: Titlebook: Developments and Advances in Defense and Security; Proceedings of MICRA álvaro Rocha,Robson Pacheco Pereira Conference proceedings 2020 Spr [打印本頁] 作者: 淹沒 時間: 2025-3-21 20:00
書目名稱Developments and Advances in Defense and Security影響因子(影響力)
書目名稱Developments and Advances in Defense and Security影響因子(影響力)學(xué)科排名
書目名稱Developments and Advances in Defense and Security網(wǎng)絡(luò)公開度
書目名稱Developments and Advances in Defense and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Developments and Advances in Defense and Security被引頻次
書目名稱Developments and Advances in Defense and Security被引頻次學(xué)科排名
書目名稱Developments and Advances in Defense and Security年度引用
書目名稱Developments and Advances in Defense and Security年度引用學(xué)科排名
書目名稱Developments and Advances in Defense and Security讀者反饋
書目名稱Developments and Advances in Defense and Security讀者反饋學(xué)科排名
作者: Injunction 時間: 2025-3-21 20:37
Smart Innovation, Systems and Technologieshttp://image.papertrans.cn/d/image/270126.jpg作者: 開頭 時間: 2025-3-22 00:49 作者: Binge-Drinking 時間: 2025-3-22 06:47 作者: 斗志 時間: 2025-3-22 12:44 作者: 招惹 時間: 2025-3-22 15:04
G. Frerichs,G. Arends,H. Z?rniguse also leads to a general increase in cybercrime concerns as well as the number of users’ victims of this permanent threat. This reality is also very present in Portugal where there is a sense of lack of control and combat of this kind of cyber-threats. In this context, it is important to know som作者: 招惹 時間: 2025-3-22 20:14
G. Frerichs,G. Arends,H. Z?rnigse days, three ways to mitigate such attacks stand out: Focus based on awareness, based on blacklists, and based on machine learning (ML). However, in the last days, Deep Learning (DL) has emerged as one of the most efficient techniques of machine learning. Thus, this systematic literature review ha作者: 觀點(diǎn) 時間: 2025-3-22 22:06 作者: 易彎曲 時間: 2025-3-23 05:14 作者: 優(yōu)雅 時間: 2025-3-23 07:25
G. Frerichs,G. Arends,H. Z?rnigve a closer look at security systems. From analog systems to the fourth generation, many changes and evolutions occurred. This makes possible to question whether mobile networks have sufficiently secure systems, and what vulnerabilities we should be aware of. Due to the widespread risk of attacks on作者: Protein 時間: 2025-3-23 13:18 作者: 招人嫉妒 時間: 2025-3-23 14:08 作者: monopoly 時間: 2025-3-23 21:59 作者: Armada 時間: 2025-3-24 00:43 作者: headlong 時間: 2025-3-24 05:20 作者: 努力趕上 時間: 2025-3-24 07:42
https://doi.org/10.1007/978-3-030-98331-4s of military strategy, personal and institutional competencies that leaders must develop, and the leadership styles of the Full Range Leadership Model (FRLM). The model applied in a first approximation to the Ecuadorian Armed Forces uses the Multifactor Leadership Questionnaire (MLQ) to determine t作者: Anonymous 時間: 2025-3-24 13:59
https://doi.org/10.1007/978-981-13-9155-2MICRADS 2019; Information and Communication Technology in Education; Simulation and Computer Vision in作者: analogous 時間: 2025-3-24 15:39
978-981-13-9157-6Springer Nature Singapore Pte Ltd. 2020作者: expdient 時間: 2025-3-24 22:27
Developments and Advances in Defense and Security978-981-13-9155-2Series ISSN 2190-3018 Series E-ISSN 2190-3026 作者: FUSC 時間: 2025-3-25 01:30 作者: 殘暴 時間: 2025-3-25 05:41
G. Frerichs,G. Arends,H. Z?rnig be able to verify the conformity between what is in the memory and the flow rules set by the controllers without overusing the system resources. A trusted execution environment is also proposed to improve the security of the auditing processes.作者: 匍匐 時間: 2025-3-25 09:51 作者: neuron 時間: 2025-3-25 14:45
Micro-controlled EOG Device for Track and Control Military Applicationsnd also for soldier monitoring. A proof of concept to act and be tested as mouse pointer was implemented with reduced circuitry and PIC microcontroller in order to achieve low cost and low profile platform. Experimental results are shown to validate a prototype of the proposed system.作者: deficiency 時間: 2025-3-25 18:39 作者: 無節(jié)奏 時間: 2025-3-25 20:49 作者: decipher 時間: 2025-3-26 00:42
G. Frerichs,G. Arends,H. Z?rnig mobile communications, telecommunication companies are increasingly emphasizing telecommunication security technologies specifically in fourth generation (4G) technology, in order to ensure the main security functions to provide an efficient service to its customers.作者: 概觀 時間: 2025-3-26 07:40
G. Frerichs,G. Arends,H. Z?rnigcoordinates of interest. In light of the above, it is suggested that this kind of study provides a low-cost surveillance and reconnaissance alternative to existing advanced systems such as satellites for countries that do not have this type of technology, as is the case of Ecuador.作者: expound 時間: 2025-3-26 11:40
Hagers Handbuch der Pharmazeutischen Praxisck surface. To ensure the effectiveness of the proposed countermeasures, proofs of concept were developed and tested in a controlled environment with a set of anti-instrumentation techniques. Finally, we evaluated the performance impact of using such countermeasures.作者: 碎石 時間: 2025-3-26 14:32
G. Frerichs,G. Arends,H. Z?rnigstricted area, resulting in a faster or slower movement that will improve the tracking of a moving target by delivering real-time object monitoring information to the user in order to take some action based on this information.作者: 激怒 時間: 2025-3-26 17:28 作者: –scent 時間: 2025-3-26 23:14 作者: Legion 時間: 2025-3-27 03:04 作者: 除草劑 時間: 2025-3-27 08:03 作者: ear-canal 時間: 2025-3-27 10:27 作者: 仲裁者 時間: 2025-3-27 16:50
Mobile Communication Systems: Evolution and Security mobile communications, telecommunication companies are increasingly emphasizing telecommunication security technologies specifically in fourth generation (4G) technology, in order to ensure the main security functions to provide an efficient service to its customers.作者: 苦惱 時間: 2025-3-27 18:11
Toward the Development of Surveillance and Reconnaissance Capacity in Ecuador: Geolocation System focoordinates of interest. In light of the above, it is suggested that this kind of study provides a low-cost surveillance and reconnaissance alternative to existing advanced systems such as satellites for countries that do not have this type of technology, as is the case of Ecuador.作者: Arroyo 時間: 2025-3-28 00:01
Conference proceedings 2020e Military Engineering Institute, Rio de Janeiro, Brazil, from 8 to 10th May 2019. It covers a variety of topics in systems, communication and defense; strategy and political-administrative vision in defense; and engineering and technologies applied to defense. Given its scope, it offers a valuable 作者: Mhc-Molecule 時間: 2025-3-28 02:45
G. Frerichs,G. Arends,H. Z?rniguser may not sign out from some services that he or she was using. This situation may lead to information security attacks. Also, we propose a solution that can be implemented on the browser to ensure a safe sign-out process.作者: Fibrinogen 時間: 2025-3-28 06:29 作者: 粗糙 時間: 2025-3-28 12:30
G. Frerichs,G. Arends,H. Z?rnigat the Portuguese’s concerns about cybercrime are in line with the average of the European citizens, although the percentage of Portuguese experienced these attacks is, for now, below average. Based on these results, it is possible to identify some public policies that aim to mitigate this phenomeno作者: 浮雕寶石 時間: 2025-3-28 17:48
G. Frerichs,G. Arends,H. Z?rnige been able to classify the Deep Learning algorithms selected in each solution, which yielded that the most commonly used are the deep neural network (DNN) and convolutional neural network (CNN), among other fundamental data.作者: 粗魯?shù)娜?nbsp; 時間: 2025-3-28 20:16 作者: Mets552 時間: 2025-3-29 00:24
https://doi.org/10.1007/978-3-662-36330-0ions using different hostility and weapon range distributions. The results demonstrated that the proposed model is able to significantly improve the number of UAVs that are able to complete the mission without being hit by any threat. In addition, the proposed approach for calculating the goal posit作者: indifferent 時間: 2025-3-29 06:39
G. Frerichs,G. Arends,H. Z?rnigsults allowed to demonstrate certain behavior of air pollutants around the city, such as the increased air pollution levels during daylight hours. Similarly, we discovered that the presence of particulate material PM10 and PM2.5 is directly related to the increase of the Air Quality Index for the ci作者: 兩棲動物 時間: 2025-3-29 10:41
Single Sign-on Implementation: Leveraging Browser Storage for Handling Tabbed Browsing Sign-outsuser may not sign out from some services that he or she was using. This situation may lead to information security attacks. Also, we propose a solution that can be implemented on the browser to ensure a safe sign-out process.作者: 可忽略 時間: 2025-3-29 12:39
Cybernetic Dependency Capacityany country, within the scope of a cyberwar, is very influenced by the dependence of this country of their information society. As a major development of the IT society in one country will not make it theoretically victorious in a cyberwarfare with a country less IT developed. This fact, which is ap作者: 異端 時間: 2025-3-29 16:35
Portuguese Concerns and Experience of Specific Cybercrimes: A Benchmarking with European Citizensat the Portuguese’s concerns about cybercrime are in line with the average of the European citizens, although the percentage of Portuguese experienced these attacks is, for now, below average. Based on these results, it is possible to identify some public policies that aim to mitigate this phenomeno作者: Nonporous 時間: 2025-3-29 20:53
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Litee been able to classify the Deep Learning algorithms selected in each solution, which yielded that the most commonly used are the deep neural network (DNN) and convolutional neural network (CNN), among other fundamental data.作者: Hemoptysis 時間: 2025-3-30 00:23 作者: Charitable 時間: 2025-3-30 07:46
Evaluating Trail Formation in Collaborative UAV Networks with Lethal Threatsions using different hostility and weapon range distributions. The results demonstrated that the proposed model is able to significantly improve the number of UAVs that are able to complete the mission without being hit by any threat. In addition, the proposed approach for calculating the goal posit作者: 制造 時間: 2025-3-30 10:52 作者: 辭職 時間: 2025-3-30 15:26
Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworkseats. In part, this owes the ability of malware developers to promptly respond to the emergence of new security solutions by developing artifacts to detect and avoid them. In this work, we present three countermeasures to mitigate recent mechanisms used by malware to detect analysis environments. Am作者: VEST 時間: 2025-3-30 19:20