標(biāo)題: Titlebook: Digital Transformation, Cyber Security and Resilience; Second International Todor Tagarev,Nikolai Stoianov Conference proceedings 2024 The [打印本頁] 作者: 從未迷惑 時間: 2025-3-21 19:44
書目名稱Digital Transformation, Cyber Security and Resilience影響因子(影響力)
書目名稱Digital Transformation, Cyber Security and Resilience影響因子(影響力)學(xué)科排名
書目名稱Digital Transformation, Cyber Security and Resilience網(wǎng)絡(luò)公開度
書目名稱Digital Transformation, Cyber Security and Resilience網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Digital Transformation, Cyber Security and Resilience被引頻次
書目名稱Digital Transformation, Cyber Security and Resilience被引頻次學(xué)科排名
書目名稱Digital Transformation, Cyber Security and Resilience年度引用
書目名稱Digital Transformation, Cyber Security and Resilience年度引用學(xué)科排名
書目名稱Digital Transformation, Cyber Security and Resilience讀者反饋
書目名稱Digital Transformation, Cyber Security and Resilience讀者反饋學(xué)科排名
作者: 裙帶關(guān)系 時間: 2025-3-21 22:03
Diya Chen,Chen Liu,Zhuofeng Zhaois is the cryptographic protection and the generators for generating random numbers RNG and PRNG. The results of the proposed method are discussed and is a shown possibility increasing cryptographic protection of the information systems.作者: Comedienne 時間: 2025-3-22 01:25 作者: synovial-joint 時間: 2025-3-22 05:20 作者: 知道 時間: 2025-3-22 12:39 作者: Instrumental 時間: 2025-3-22 15:54 作者: Instrumental 時間: 2025-3-22 17:28 作者: 準(zhǔn)則 時間: 2025-3-22 23:34 作者: Humble 時間: 2025-3-23 03:00
1865-0929 urity solutions; education and training for cyber resilience; ICT governance and management for digital transformation..978-3-031-44439-5978-3-031-44440-1Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: separate 時間: 2025-3-23 07:10
Distributed Ledger-Based Trustful Information Exchange on the Tactical Leveln exchange between Command and Control Information Systems of different NATO nations and non-NATO stakeholders such as non-NATO nations or mission observers. Moreover, the distributed ledger supports available NATO standards and formats for da-ta exchange and storage.作者: Mercurial 時間: 2025-3-23 12:43 作者: 到婚嫁年齡 時間: 2025-3-23 14:54 作者: CRUC 時間: 2025-3-23 19:40 作者: Malcontent 時間: 2025-3-24 00:09
Conference proceedings 2024 critical infrastructures and essential services from cyberattacks; big data and artificial intelligence for cybersecurity; advanced ICT security solutions; education and training for cyber resilience; ICT governance and management for digital transformation..作者: synovitis 時間: 2025-3-24 05:52 作者: TEM 時間: 2025-3-24 06:54 作者: 的染料 時間: 2025-3-24 10:52 作者: Physiatrist 時間: 2025-3-24 15:04 作者: 一加就噴出 時間: 2025-3-24 22:07 作者: 衰弱的心 時間: 2025-3-25 01:23
Wie fühlen sich Kunden willkommen? ing behind the ongoing processes of this transformation. The article argues that WB leaders need to comprehend digital transformation and use this process to improve governance, boost the economy and address existing social challenges.作者: 原始 時間: 2025-3-25 03:40
https://doi.org/10.1007/978-3-031-44440-1cyber security; resilience; software engineering; artificial intelligence; Internet of Things; software d作者: 神秘 時間: 2025-3-25 09:33 作者: Mere僅僅 時間: 2025-3-25 13:28
Forum DienstleistungsmanagementAfter the analysis of the possible cipher attacks against the popular asymmetric cipher RSA, a new method is proposed. This method uses the factorization of large numbers and is successful against RSA only when the two prime numbers used to generate the keys for the cipher have close values.作者: 失望昨天 時間: 2025-3-25 16:26
Cipher Attack Against the Assymetric Cipher RSAAfter the analysis of the possible cipher attacks against the popular asymmetric cipher RSA, a new method is proposed. This method uses the factorization of large numbers and is successful against RSA only when the two prime numbers used to generate the keys for the cipher have close values.作者: 無力更進(jìn) 時間: 2025-3-25 21:38
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/279849.jpg作者: 大洪水 時間: 2025-3-26 04:01
Ziyu Li,Tong Mo,Weiping Li,Zhiying Tuimplementations of fielded systems coexist with legacy systems. A plethora of platforms, nodes and information sources integrate a hyper connected battlefield. This article analyses the challenges in seeking harmonized solutions in the field of communications and information systems and especially a作者: 沒血色 時間: 2025-3-26 04:38 作者: Musculoskeletal 時間: 2025-3-26 09:00 作者: NOMAD 時間: 2025-3-26 15:27 作者: 翻動 時間: 2025-3-26 19:50
Diya Chen,Chen Liu,Zhuofeng Zhao lives. The rapid switching to many digital solutions that technological advancement provides is the salvation from the growing covid threat that continues to take its toll. But Cybercrime embodied in terrorism, kidnapping, industrial and economic espionage can be no less dangerous to modern society作者: 情感 時間: 2025-3-27 00:14
https://doi.org/10.1007/978-981-99-4402-6Communities of Interest (COI), is of paramount importance for effective execution of NATO operations. Current information protection practices rely to a large extent on a network-layer mechanism for compartmentalization of information and separation between different COIs. This leads to segregation 作者: 思考而得 時間: 2025-3-27 04:33 作者: 廚房里面 時間: 2025-3-27 05:58 作者: 黃瓜 時間: 2025-3-27 09:59
Entstehung und Wahrnehmung des Service Value will ensure mobility, adaptability and fault tolerance of a multi-agent protection system (MAS). The analysis of classes of MAS agents by their functionality is conducted. The integration of MAS in corporate networks is based on the distribution of corporate network components between agents which 作者: enmesh 時間: 2025-3-27 15:17
Alexander Leischnig,Uwe Messer M.Sc.yption keys for transmitting Big Data in conditions of information exchange via open communication channels. The authors improve the Diffie-Hellman algorithm by using a new type of one-way functions - cellular automats. The used automats have extended rules in the direction of determining the laws o作者: Aviary 時間: 2025-3-27 21:13 作者: Generosity 時間: 2025-3-28 01:50
Was hei?t Preis-Leistungs-Verh?ltnis? drone K band signatures have been recorded and analyzed. It has been confirmed by analysis of recorded spectrograms that drone K band radar signatures are influenced mainly by the drone frame motion. The signals from the rotation of the propellers are of lower intensity with characteristic spectral作者: 熟練 時間: 2025-3-28 05:34
Wie fühlen sich Kunden willkommen? ing behind the ongoing processes of this transformation. The article argues that WB leaders need to comprehend digital transformation and use this process to improve governance, boost the economy and address existing social challenges.作者: exclusice 時間: 2025-3-28 09:18
Leadership Playbook for the Digital Age: Preparing the Western Balkan Leadership for the Digital Traing behind the ongoing processes of this transformation. The article argues that WB leaders need to comprehend digital transformation and use this process to improve governance, boost the economy and address existing social challenges.作者: badinage 時間: 2025-3-28 11:21 作者: 誘使 時間: 2025-3-28 18:11 作者: 植物群 時間: 2025-3-28 19:15
An Empirical Evaluation of Cyber Threat Intelligence Sharing in the ECHO Early Warning Systemtency centres participated in the form of CSIRTs employed the ECHO Early Warning System. Through a structured tabletop exercise, over 10 CSIRTS were engaged and a number of features were captured and monitored. A key research question was to determine the factors that can potentially hinder or ampli作者: CROW 時間: 2025-3-29 01:28
Approaching Cyber Situational Awareness Through Digital Services Availability Monitoring and Threat international scale. Additionally, in recent years, and particularly as the online operations of many sectors of daily life have become increasingly interdependent, the need to safeguard individual services to protect entire economic sectors has become increasingly apparent. Intrusion detection and作者: 泥沼 時間: 2025-3-29 06:20 作者: 似少年 時間: 2025-3-29 09:00 作者: amygdala 時間: 2025-3-29 13:21 作者: Asseverate 時間: 2025-3-29 16:11
Cybersecurity in?Donated Distributed Computing for?Evolutionary Algorithmsting resources. Donated calculating power can involve thousands of separate CPUs and it can achieve the performance of a supercomputer. In most of the cases donated distributed computing is organized by open source software, which can lead to the involvement of many more volunteers. This research fo作者: indignant 時間: 2025-3-29 20:47
Modelling a Multi-agent Protection System of an Enterprise Network will ensure mobility, adaptability and fault tolerance of a multi-agent protection system (MAS). The analysis of classes of MAS agents by their functionality is conducted. The integration of MAS in corporate networks is based on the distribution of corporate network components between agents which 作者: OPINE 時間: 2025-3-30 03:58
Analysis of Workability of One-Way Functions Based on Cellular Automata in Diffie–Hellman Algorithm yption keys for transmitting Big Data in conditions of information exchange via open communication channels. The authors improve the Diffie-Hellman algorithm by using a new type of one-way functions - cellular automats. The used automats have extended rules in the direction of determining the laws o作者: milligram 時間: 2025-3-30 07:32 作者: 下船 時間: 2025-3-30 11:55
K Band Radar Drone Signatures drone K band signatures have been recorded and analyzed. It has been confirmed by analysis of recorded spectrograms that drone K band radar signatures are influenced mainly by the drone frame motion. The signals from the rotation of the propellers are of lower intensity with characteristic spectral作者: 老巫婆 時間: 2025-3-30 15:08 作者: antidote 時間: 2025-3-30 16:51 作者: 大量殺死 時間: 2025-3-30 23:19
Jianping Wang,Bin Xiao,Xuanzhe Liuures, rendering them inaccessible to small and medium-sized enterprises (SMEs), academic institutions, and non-profit organizations that are unable to afford, administer, manage, or even consider employing IDS/IPS in their organizational frame of reference..This article is a revised and extended ver