派博傳思國(guó)際中心

標(biāo)題: Titlebook: Developments and Advances in Defense and Security; Proceedings of MICRA álvaro Rocha,Carlos Hernan Fajardo-Toro,José María Conference proce [打印本頁(yè)]

作者: GURU    時(shí)間: 2025-3-21 20:01
書目名稱Developments and Advances in Defense and Security影響因子(影響力)




書目名稱Developments and Advances in Defense and Security影響因子(影響力)學(xué)科排名




書目名稱Developments and Advances in Defense and Security網(wǎng)絡(luò)公開度




書目名稱Developments and Advances in Defense and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Developments and Advances in Defense and Security被引頻次




書目名稱Developments and Advances in Defense and Security被引頻次學(xué)科排名




書目名稱Developments and Advances in Defense and Security年度引用




書目名稱Developments and Advances in Defense and Security年度引用學(xué)科排名




書目名稱Developments and Advances in Defense and Security讀者反饋




書目名稱Developments and Advances in Defense and Security讀者反饋學(xué)科排名





作者: 衰弱的心    時(shí)間: 2025-3-21 21:11

作者: Pudendal-Nerve    時(shí)間: 2025-3-22 01:07
Developments and Advances in Defense and Security978-981-16-4884-7Series ISSN 2190-3018 Series E-ISSN 2190-3026
作者: Critical    時(shí)間: 2025-3-22 08:16

作者: 爭(zhēng)議的蘋果    時(shí)間: 2025-3-22 11:24

作者: 使出神    時(shí)間: 2025-3-22 15:27
Mit Worten streiten – und über sieploiting specific?characteristics of the human being. This is considered to be still one of the most threatening?attacks within the digital world. The current study aims to explore social engineering attacks with significant impact. We conducted a systematic literature review from 2011 to 2020, appl
作者: 使出神    時(shí)間: 2025-3-22 18:54

作者: 逃避現(xiàn)實(shí)    時(shí)間: 2025-3-22 23:18

作者: indenture    時(shí)間: 2025-3-23 03:51
https://doi.org/10.1007/978-3-531-19129-4new developments that allow companies to get actionable insights and improve their business model. This is what digital transformation is about. It refers to the process of involving new technologies to create new business processes or change existing ones. Digital transformation can be very benefic
作者: 咯咯笑    時(shí)間: 2025-3-23 08:33
https://doi.org/10.1007/978-3-531-19129-4s up a large proportion of the tourism market, and demand is on the rise. Despite the large numbers of people on board, crime reporting on cruise ships is so far relatively low. While the ship itself faces security threats, activities on board and on shore provide many opportunities for targets and
作者: MAG    時(shí)間: 2025-3-23 10:50

作者: CRANK    時(shí)間: 2025-3-23 15:31

作者: Clumsy    時(shí)間: 2025-3-23 21:01

作者: HARD    時(shí)間: 2025-3-24 02:14

作者: 嘲弄    時(shí)間: 2025-3-24 05:01

作者: jumble    時(shí)間: 2025-3-24 09:49
René K?nig Schriften. Ausgabe letzter Handeffect they cause in the environment and the regions where they occur. Detection by traditional methods is cumbersome and costly. For this reason, we propose a solution leveraging machine learning techniques using multispectral satellite imagery. We implemented these techniques and evaluated their p
作者: nominal    時(shí)間: 2025-3-24 13:10
René K?nig Schriften. Ausgabe letzter Handy and specializations courses (Surface, submarines, coast guards); the research focused on the use of a full mission simulator of the bridge, meeting the need to achieve competencies related to those officers who must perform duties like watch officer in the bridge of navy ships in the future. An ex
作者: 充氣球    時(shí)間: 2025-3-24 16:24

作者: Atheroma    時(shí)間: 2025-3-24 19:16

作者: 輕打    時(shí)間: 2025-3-25 00:53

作者: 冰雹    時(shí)間: 2025-3-25 03:20

作者: 核心    時(shí)間: 2025-3-25 09:16
Detection of Opencast Mining Sites from Multispectral Satellite Imageserformance using real-world examples and considering various important performance metrics. The results show that these techniques provide an accurate detection system and do not require costly computational resources.
作者: 捐助    時(shí)間: 2025-3-25 14:22

作者: 虛弱    時(shí)間: 2025-3-25 18:08

作者: Abrade    時(shí)間: 2025-3-25 20:33
Eine Gemeindestudie aus der Türkeiaim is not only to detect drones but also to distinguish the type of detected drone. Different networks were trained whereupon an analysis was conducted in which it was found that the YOLOv4tiny network with 416?×?416 input resolution presents the best results considering both the inference performance and the processing speed.
作者: Incorporate    時(shí)間: 2025-3-26 04:05
René K?nig Schriften. Ausgabe letzter Handerformance using real-world examples and considering various important performance metrics. The results show that these techniques provide an accurate detection system and do not require costly computational resources.
作者: ARBOR    時(shí)間: 2025-3-26 05:37
2190-3018 cations in defense and security.Offers a valuable resource fThis book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2021), held at Naval Cadet School "Almirante Padilla", in Cartagena, Colombia, during August 18–20, 202
作者: Folklore    時(shí)間: 2025-3-26 11:07
2190-3018 and technologies applied to defense. Given its scope, it offers a valuable resource for practitioners, researchers, and students alike.?.978-981-16-4886-1978-981-16-4884-7Series ISSN 2190-3018 Series E-ISSN 2190-3026
作者: seruting    時(shí)間: 2025-3-26 14:25
Schreiben lernen, schreibend lernen by the power struggle between nations and politicians, also considering the lack of technological knowledge or training in organizations. As a result, it allows the attackers using social engineering as the most effective mean for systems intruding.
作者: 憤慨一下    時(shí)間: 2025-3-26 19:56
Mit Worten streiten – und über sien of optimal strategies and information on the expected and observed behavior of the actors, necessary for the implementation of frameworks and models that allow improving the decision-making process at the strategic level of cyberdefense.
作者: alleviate    時(shí)間: 2025-3-27 00:17
https://doi.org/10.1007/978-3-531-19129-4at sea, with a specific focus on cruising ships, currently under development with the scope of the H2020 ISOLA project. Several fusion algorithms are described and discussed, while further needs for more secure cyber environments are finally discussed.
作者: cinder    時(shí)間: 2025-3-27 01:26

作者: 責(zé)任    時(shí)間: 2025-3-27 08:36
Maritime Cyberdefense Actors Taxonomy for Command and Controln of optimal strategies and information on the expected and observed behavior of the actors, necessary for the implementation of frameworks and models that allow improving the decision-making process at the strategic level of cyberdefense.
作者: 殺死    時(shí)間: 2025-3-27 10:10
ISOLA: An Innovative Approach to Cyber Threat Detection in Cruise Shippingat sea, with a specific focus on cruising ships, currently under development with the scope of the H2020 ISOLA project. Several fusion algorithms are described and discussed, while further needs for more secure cyber environments are finally discussed.
作者: 左右連貫    時(shí)間: 2025-3-27 17:03
Conference proceedings 2022t Naval Cadet School "Almirante Padilla", in Cartagena, Colombia, during August 18–20, 2021. It covers a broad range of topics in systems, communication, and defense; strategy and political–administrative vision in defense; and engineering and technologies applied to defense. Given its scope, it off
作者: CAMP    時(shí)間: 2025-3-27 19:45
III.4 Keine Rettung ohne Judenstaat (1938)ith connectivity to the conventional distribution network, to dispose continuous quality service. The research presents the fundamental principles for the emphasis on the use of renewable energy and helps to identify opportunities in the relationship between renewable energy and telecommunications.
作者: 線    時(shí)間: 2025-3-27 22:55

作者: 絕種    時(shí)間: 2025-3-28 05:21
Green Energy for Nodes of Hybrid Fiber-Coaxial Networks in the Transmission and Distribution of Signith connectivity to the conventional distribution network, to dispose continuous quality service. The research presents the fundamental principles for the emphasis on the use of renewable energy and helps to identify opportunities in the relationship between renewable energy and telecommunications.
作者: Flatter    時(shí)間: 2025-3-28 06:20
Impact of the Use of Simulators on Training and Specialization in the Navyd problem-based learning were used. The results allowed us to establish the cognitive, affective and psychomotor domains that developed in this type of activities where an advanced simulation environment is used as an educational technology.
作者: 輕率的你    時(shí)間: 2025-3-28 11:25

作者: 有發(fā)明天才    時(shí)間: 2025-3-28 15:29

作者: meditation    時(shí)間: 2025-3-28 21:43
Digital Transformation Impact in Security and Privacycern for both businesses and consumers. Security and privacy are key factors companies need to consider when implementing technologies that could potentially affect the consumer. In order to succeed and avoid big cost implications, measures that ensure the security of data are necessary. This paper
作者: 口味    時(shí)間: 2025-3-29 00:53

作者: LUDE    時(shí)間: 2025-3-29 06:25

作者: pantomime    時(shí)間: 2025-3-29 08:20
Nexus of Electrospun Nanofibers and Additive Processing—Overview of Wearable Tactical Gears for CBRNfective protection for various specific applications. Thus, the newly developed composite materials gained various features such as flame retardancy, UV protection, pollutant capturing, antibacterial property, decontamination, detoxification, and self-cleaning ability as well as providing donning co
作者: Commentary    時(shí)間: 2025-3-29 12:18
Mehr über das Gesch?ft berichtenible to perceive that the Portuguese’s concerns about cybercrime are in line with the average of the European citizens, although the percentage of Portuguese that takes attitudes and actions to combat cyber-threats is a little bit above the average recorded by citizens of European countries.
作者: mydriatic    時(shí)間: 2025-3-29 16:12
Mit Worten streiten – und über siee with a certain lack of knowledge, celebrities, politicians, and middle and senior managers. Furthermore, social networks and e-mail are the primary sources from which attacks occur. Finally, we identified that Phishing and Ransomware are the most significant attacks on companies and individuals.
作者: 在前面    時(shí)間: 2025-3-29 21:32

作者: EXPEL    時(shí)間: 2025-3-30 02:41

作者: 孵卵器    時(shí)間: 2025-3-30 04:26
III.2 Zur Kritik des Judentums (1921)performed using a laboratory test bench for electric motors where it is observed that the Park transform provides wide and clean results over the entire frequency range, eliminating the uncertainties and/or errors that may arise in the event of a diagnosis of broken bar fault compared to MCSA result
作者: abysmal    時(shí)間: 2025-3-30 09:16

作者: Nucleate    時(shí)間: 2025-3-30 13:02
An Analysis of Cyber Espionage Processme of cyber espionage process based on a literature review of remarkable cases which generated news about this topic and includes the malware report analysis made by security vendors. To understand the aspects involved and the approaches employed, we defined a general model to cover all phases used
作者: 袖章    時(shí)間: 2025-3-30 17:54
Portuguese Concerns and Impact on Behaviour About Cybersecurity: A Comparison with the European Averty challenges that can have high economic impacts. The growth of Internet use is also leading to a general increase in cybercrime concerns as well as the number of users’ victims of this permanent threat. This reality is also very present in Portugal as well as in other European countries. In this c




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
浑源县| 临沂市| 甘孜| 宁津县| 京山县| 黑山县| 同心县| 平舆县| 枣强县| 稷山县| 定襄县| 大田县| 剑河县| 浦东新区| 绥德县| 客服| 乡宁县| 湘西| 同德县| 酒泉市| 都江堰市| 加查县| 宁南县| 光山县| 台安县| 通海县| 黄石市| 屏边| 平武县| 土默特右旗| 青海省| 织金县| 昌邑市| 朝阳区| 新巴尔虎右旗| 嘉荫县| 彭泽县| 建始县| 南康市| 怀宁县| 临湘市|