標(biāo)題: Titlebook: Digital Transformation, Cyber Security and Resilience of Modern Societies; Todor Tagarev,Krassimir T. Atanassov,Janusz Kacprz Book 2021 Th [打印本頁] 作者: complicated 時間: 2025-3-21 17:45
書目名稱Digital Transformation, Cyber Security and Resilience of Modern Societies影響因子(影響力)
書目名稱Digital Transformation, Cyber Security and Resilience of Modern Societies影響因子(影響力)學(xué)科排名
書目名稱Digital Transformation, Cyber Security and Resilience of Modern Societies網(wǎng)絡(luò)公開度
書目名稱Digital Transformation, Cyber Security and Resilience of Modern Societies網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Digital Transformation, Cyber Security and Resilience of Modern Societies被引頻次
書目名稱Digital Transformation, Cyber Security and Resilience of Modern Societies被引頻次學(xué)科排名
書目名稱Digital Transformation, Cyber Security and Resilience of Modern Societies年度引用
書目名稱Digital Transformation, Cyber Security and Resilience of Modern Societies年度引用學(xué)科排名
書目名稱Digital Transformation, Cyber Security and Resilience of Modern Societies讀者反饋
書目名稱Digital Transformation, Cyber Security and Resilience of Modern Societies讀者反饋學(xué)科排名
作者: exceptional 時間: 2025-3-21 22:18
Comparing Cybersecurity Information Exchange Models and Standards for the Common Secure Information ared among too many developers. Operational work concerning cyber threat prevention between European public safety authorities should be more standardized, with more centralized information management system. When the purpose is to protect the critical infrastructure of society, public safety organi作者: POINT 時間: 2025-3-22 01:30
Cyber Situational Awareness in Critical Infrastructure Organizationsncludes a three-leveled (strategic, operational and technical/tactical) operating model related to the organization’s decision-making. The cyber environment is dynamic and hence especially the strategic agility is required when preparing for incidents. The pervasive incidents targeting society are a作者: Leaven 時間: 2025-3-22 07:35
Possible Instant Messaging Malware Attack Using Unicode Right-To-Left Override presents a realistic threat for another widely used messenger—Microsoft’s Skype for Linux. Our purpose for conducting this research was to describe an exploit that we discovered and to warn the people who use this communication application about it, as well as to appeal to the producer for fixing i作者: 主動 時間: 2025-3-22 09:06 作者: 墻壁 時間: 2025-3-22 13:23
Digital Transformation, Cyber Security and Resilience of Modern Societies作者: 墻壁 時間: 2025-3-22 18:45
Book 2021rs in the field of?cyber security?and protection against hybrid threats, as well as to?policymakers?and senior managers with responsibilities in information and knowledge management, security policies,?and?human resource management and training.?..作者: synovitis 時間: 2025-3-23 00:52
The Prism Effect of Service-Learningomain (CISE) is used for common situational awareness between European maritime authorities. Though an extensive and objective comparison of naval surveillance systems, based on public sources, is challenging because information from different sensors and providers is difficult to compare, the autho作者: absorbed 時間: 2025-3-23 03:44
Drew Allen,Diana Strumbos,Janelle Clayared among too many developers. Operational work concerning cyber threat prevention between European public safety authorities should be more standardized, with more centralized information management system. When the purpose is to protect the critical infrastructure of society, public safety organi作者: alliance 時間: 2025-3-23 09:18
Jordi Comas,Tammy Bunn Hiller,John Millerncludes a three-leveled (strategic, operational and technical/tactical) operating model related to the organization’s decision-making. The cyber environment is dynamic and hence especially the strategic agility is required when preparing for incidents. The pervasive incidents targeting society are a作者: 大喘氣 時間: 2025-3-23 13:11 作者: Endometrium 時間: 2025-3-23 16:37 作者: 我的巨大 時間: 2025-3-23 21:04 作者: Ingrained 時間: 2025-3-24 00:24 作者: 變形 時間: 2025-3-24 06:23
Generalized Net Model of Cyber-Control of the Firm’s Dumpers and CrushersA generalized net model of a system for tracking and monitoring the movement and actions of a firm’s dumpers and crushers is proposed. The presented model permits analysis regarding possible cyber manipulation of data, and highlights the crucial vulnerabilities of such systems.作者: 戰(zhàn)勝 時間: 2025-3-24 09:49
Digital Transformation, Cyber Security and Resilience of Modern Societies978-3-030-65722-2Series ISSN 2197-6503 Series E-ISSN 2197-6511 作者: 無效 時間: 2025-3-24 13:09
https://doi.org/10.1007/978-3-030-65722-2Digitalization; Cyber Threats; Malware; Cybersecurity; Information Sharing; Situational Awareness; Social 作者: ANTH 時間: 2025-3-24 18:44
978-3-030-65724-6The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: IST 時間: 2025-3-24 19:24
Service- und Materialmanagementcedures and techniques to ensure a real-time synchronization of effects in operations across domains. The way joint forces operate depends on how the operational environment evolves in multiple domains, at the same time creating synergies and dependencies among them. Information is traditionally sha作者: 討好美人 時間: 2025-3-25 00:50
Frank-Dieter Dorloff,Volker Fahnerts, their security levels and the increased requirements they must meet when used in defence and security. The main standards and requirements that modern data centres have to meet to ensure a high level of availability of the IT services provided are considered. Specific requirements have been formu作者: 未成熟 時間: 2025-3-25 05:56
Analyse und Management des Kundenservicethe cybersecurity domain. The research is focused on identifying the steps to support optimal decision making in defining processes and structures needed for the network governance and management. The approach links Enterprise Architecture model, COBIT framework and network analysis aiming to define作者: STALL 時間: 2025-3-25 08:47
Die Chancen nutzen: Augenblicke der Wahrheitgement of cyber education environments through the Course Manager platform, developed by the authors’ team. The serverless paradigm, also referred to as Function-as-a-Service (FaaS), helps the developers abstract or automate almost all infrastructure and operation overhead, allowing for what is ofte作者: 宴會 時間: 2025-3-25 12:18
https://doi.org/10.1007/978-3-322-82710-4 their competitiveness and establishing their place on the world market. The unified Platform for Automation and Management of Standards (PAMS) is a high-tech innovative product in the field of information technologies. PAMS is a modern, integrated information and communication system that models, d作者: 全面 時間: 2025-3-25 18:03 作者: orient 時間: 2025-3-25 22:31 作者: 種子 時間: 2025-3-26 02:40 作者: OATH 時間: 2025-3-26 04:50 作者: Texture 時間: 2025-3-26 08:38 作者: UNT 時間: 2025-3-26 13:07 作者: 拾落穗 時間: 2025-3-26 16:52
Marilynne Boyle-Baise,Paul Binfordfice uses a macro programming language called Visual Basic for Applications (VBA), which is powerful enough to do whatever the attacker needs. Usually, the malicious VBA macros are used to download the second stage of the malware (ransomware, banking Trojan, backdoor, etc.). They can be relatively s作者: 似少年 時間: 2025-3-26 22:19 作者: 鋸齒狀 時間: 2025-3-27 01:34 作者: 燕麥 時間: 2025-3-27 05:53
Lecture Notes in Computer Sciencery and academia. It is proposed to build such a model using well-known standards of IT security—Common criteria and methodology for IT security evaluation. The formation of a model of knowledge management is carried out by analyzing the content of the relevant elements of standards and establishing 作者: 威脅你 時間: 2025-3-27 11:45 作者: 智力高 時間: 2025-3-27 17:23
Studies in Big Datahttp://image.papertrans.cn/d/image/279850.jpg作者: 處理 時間: 2025-3-27 21:28 作者: Custodian 時間: 2025-3-27 22:21
Conceptualizing Service-Learninghe last ten years (between 2012 and 2019) as well as four different types of cybersecurity testing methods employed by cybersecurity researchers. This survey will help students, researchers, and professionals with designing and building their testbeds and refining their testing techniques and methodologies.作者: 極肥胖 時間: 2025-3-28 02:39
Automotive Cybersecurity Testing: Survey of Testbeds and Methodshe last ten years (between 2012 and 2019) as well as four different types of cybersecurity testing methods employed by cybersecurity researchers. This survey will help students, researchers, and professionals with designing and building their testbeds and refining their testing techniques and methodologies.作者: ABIDE 時間: 2025-3-28 09:21 作者: 滲透 時間: 2025-3-28 13:27 作者: 朦朧 時間: 2025-3-28 14:42
Die Chancen nutzen: Augenblicke der Wahrheiter provides an in-depth overview of the architecture and frontend of a cyber-education environment management framework, designed to work in a serverless environment and analyses the lessons learnt from using this framework for the provision of cyber trainings to students and IT professionals for more than a year.作者: 健忘癥 時間: 2025-3-28 22:45
https://doi.org/10.1007/978-3-322-82710-4nally recognized standards. By modelling different sets of standards with the unified objects and processes, PAMS is a highly effective in monitoring, control and operational management and can assure implementation of the requirements of the standards and their practical utility.作者: Calibrate 時間: 2025-3-28 23:40
Dienen: Philosophie der Kundenorientierungdy explores options for these four areas and suggests the approach to select the most suitable, as well as how to integrate them through effective system for governance and management in the specific environment of the Bulgarian Academy of Sciences as a national academic institution for both fundamental and applied research and education.作者: Chameleon 時間: 2025-3-29 03:12 作者: Eructation 時間: 2025-3-29 10:26 作者: escalate 時間: 2025-3-29 13:31 作者: 我怕被刺穿 時間: 2025-3-29 17:38 作者: 厚顏 時間: 2025-3-29 20:02
Unified Innovative Platform for Administration and Automated Management of Internationally Recognizenally recognized standards. By modelling different sets of standards with the unified objects and processes, PAMS is a highly effective in monitoring, control and operational management and can assure implementation of the requirements of the standards and their practical utility.作者: Hirsutism 時間: 2025-3-30 01:25 作者: 連系 時間: 2025-3-30 06:43 作者: inventory 時間: 2025-3-30 10:17 作者: 外面 時間: 2025-3-30 15:14 作者: PLE 時間: 2025-3-30 20:10 作者: Vulnerary 時間: 2025-3-31 00:02 作者: 枯萎將要 時間: 2025-3-31 02:47 作者: Tortuous 時間: 2025-3-31 07:56
Scoping the Scenario Space for Multi-sector Cybersecurity Analysisomprehensively the scenario space. The authors present a partial list of selected scenarios, storylines, and use cases, that are used in follow-up research to define key components of the capability requirements: technology roadmaps, cyber skills framework, information exchange and certification requirements.作者: Constituent 時間: 2025-3-31 09:47 作者: Cognizance 時間: 2025-3-31 14:06 作者: Diluge 時間: 2025-3-31 20:01