標(biāo)題: Titlebook: E-Business and Telecommunications; 18th International C Pierangela Samarati,Marten van Sinderen,Fons Wijnh Conference proceedings 2023 The [打印本頁] 作者: BRISK 時(shí)間: 2025-3-21 18:45
書目名稱E-Business and Telecommunications影響因子(影響力)
書目名稱E-Business and Telecommunications影響因子(影響力)學(xué)科排名
書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度
書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱E-Business and Telecommunications被引頻次
書目名稱E-Business and Telecommunications被引頻次學(xué)科排名
書目名稱E-Business and Telecommunications年度引用
書目名稱E-Business and Telecommunications年度引用學(xué)科排名
書目名稱E-Business and Telecommunications讀者反饋
書目名稱E-Business and Telecommunications讀者反饋學(xué)科排名
作者: Resistance 時(shí)間: 2025-3-21 23:41
https://doi.org/10.1007/978-3-031-36840-0authentication; communication systems; computer hardware; computer networks; computer science; computer s作者: 步履蹣跚 時(shí)間: 2025-3-22 03:33 作者: notice 時(shí)間: 2025-3-22 06:53 作者: EXUDE 時(shí)間: 2025-3-22 11:08
Managing the Machine Learning Life Cycle,rt video platform background. It considers China’s short video interactive environment and divides the cultural content into the cultural vision unit and cultural audition unit according to the sensory marketing theory. Through testing numerous EMG video content based on the covariance analysis meth作者: Dysplasia 時(shí)間: 2025-3-22 14:35
Beginning App Development with Fluttercluding researchers, research units, universities, businesses, and the larger society. Investing in early-stage technology or technology that is novel and has an inventive step can imply a high-risk investment. High-quality information and advice are needed, and valuation methods are required, to su作者: Dysplasia 時(shí)間: 2025-3-22 17:21 作者: 不如屎殼郎 時(shí)間: 2025-3-22 22:38 作者: 胡言亂語 時(shí)間: 2025-3-23 02:30
https://doi.org/10.1007/978-1-4302-2536-2universities are no longer seen as “ivory towers” in which research is cut off from the rest of the society, but rather as establishments with a profound knowledge and technology transfer. However, transfer often still occurs in an uncoordinated manner without distinct processes or coordination. A d作者: inferno 時(shí)間: 2025-3-23 09:10 作者: 廣告 時(shí)間: 2025-3-23 11:20 作者: dissent 時(shí)間: 2025-3-23 16:47
Creating a Spring Boot Project,e are considering zero-knowledge arguments that establish that the corresponding computations are done correctly and that the resulting commitment is indeed on the prime number derived from .. Depending on the number of zero-knowledge argument rounds . and the number of primality bases . used to est作者: 緯度 時(shí)間: 2025-3-23 18:25
Importing Data into Power BI Desktop,not offend the privacy of each individual. Microaggregation applied to databases is a standard technique to protect privacy. It clusters similar people in larger groups to achieve so called .-anonymity – every individual is hidden in a cluster of size at least .. Then the data can be made public for作者: 清真寺 時(shí)間: 2025-3-24 01:28
Beginning Oracle SQL for Oracle Database 18crely under such limitations. For a few years, the Internet Engineering Task Force (IETF) has been working to standardize EDHOC, an authenticated key establishment protocol for such constrained IoT devices. The first version of EDHOC was proposed in 2016. In 2018, Bruni et al.?[.] used the ProVerif t作者: 文藝 時(shí)間: 2025-3-24 04:20 作者: 密切關(guān)系 時(shí)間: 2025-3-24 10:31 作者: boisterous 時(shí)間: 2025-3-24 13:28
Importing Data into Power Pivotnergy consumption data is immensely useful for maintaining and operating grid services. Further, these data can be used for future consumption prediction using machine learning and statistical models and market segmentation purposes. However, sharing and releasing fine-grained energy data or releasi作者: arousal 時(shí)間: 2025-3-24 17:46
Importing Data into Power Pivotryptographic algorithms are typically protected by using the algebraic properties of the algorithms. In this work, we present an exponent splitting technique with minimal impact on performance based on Boolean shares. This method can be combined with other countermeasures to make a side-channel resi作者: SHRIK 時(shí)間: 2025-3-24 20:41 作者: Scintillations 時(shí)間: 2025-3-24 23:44 作者: Left-Atrium 時(shí)間: 2025-3-25 07:07 作者: Exploit 時(shí)間: 2025-3-25 09:23
Conference proceedings 2023 and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021..The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography..作者: 暫時(shí)休息 時(shí)間: 2025-3-25 12:28
Pierangela Samarati,Marten van Sinderen,Fons Wijnh作者: Osteoporosis 時(shí)間: 2025-3-25 16:05 作者: 輕推 時(shí)間: 2025-3-25 23:43
Technology Transfer and Valuation Methods in Use by University Technology Transfer Officesng eight Portuguese University TTOs. From the data it was possible to conclude that pre-defined rating/ranking methods and models are the most frequently used valuation methods, followed by market valuation approaches. Previous agreements and discounted cash-flow projections are mainly used when a s作者: invert 時(shí)間: 2025-3-26 01:58
Improved Protection of User Data Through the Use of a Traceable Anonymous One Time Passwordge, Arduino IDE (programming platform) and the Proteus Simulation software. Results obtained from the experiments conducted demonstrate that the user data was being protected successfully as access from online was restricted as desired.作者: Inflammation 時(shí)間: 2025-3-26 08:10 作者: outskirts 時(shí)間: 2025-3-26 09:55
A Classification of?Software-Architectural Uncertainty Regarding Confidentialityise statements about uncertain influences and their impact on confidentiality. It raises awareness of uncertainty properties, enables knowledge transfer to non-experts, and serves as a baseline for discussion. Also, it can be directly integrated into existing notions of data flow diagrams for uncert作者: maladorit 時(shí)間: 2025-3-26 12:45
Improving Time Complexity and?Utility of?,-anonymous Microaggregationion or suppression. However, minimizing the information loss by .-anonymous microaggregation is an NP-hard optimization problem for .. Not only computing optimal solutions efficiently is unlikely, nontrivial approximations are lacking, too. Therefore, a bunch of heuristics all with at least quadrati作者: bioavailability 時(shí)間: 2025-3-26 19:17
Extended Formal Analysis of?the?EDHOC Protocol in?Tamarinextend the modeling in?[.] with trusted execution environments (TEEs), modify the way we model . encryption, and in addition to the properties verified in?[.], we verify weak post-compromise security (PCS) as well as the secrecy and integrity of some additional data used as part of the protocol.作者: GRIPE 時(shí)間: 2025-3-26 23:34 作者: 無能力之人 時(shí)間: 2025-3-27 04:33
Trace Recovery: Attacking and?Defending the?User Privacy in?Smart Meter Data Analyticsdividual consumption load patterns. We propose an unsupervised attack framework to recover hourly energy consumption time-series of users without any background information. We construct the problem of assigning aggregated energy consumption meter readings to individual users as a mathematical assig作者: 巨大沒有 時(shí)間: 2025-3-27 06:41 作者: Surgeon 時(shí)間: 2025-3-27 12:16
Beginning App Development with Flutterng eight Portuguese University TTOs. From the data it was possible to conclude that pre-defined rating/ranking methods and models are the most frequently used valuation methods, followed by market valuation approaches. Previous agreements and discounted cash-flow projections are mainly used when a s作者: synovium 時(shí)間: 2025-3-27 14:33
Implementing Object Collaboration,ge, Arduino IDE (programming platform) and the Proteus Simulation software. Results obtained from the experiments conducted demonstrate that the user data was being protected successfully as access from online was restricted as desired.作者: 笨拙的我 時(shí)間: 2025-3-27 19:22
Networking, Bluetooth, and Social,hod extends the utility of the classification model and aims to provide guidance to scholars and practitioners for assessing, selecting, evaluating, and implementing process mining techniques to realize operational support. A case study at a logistics service provider demonstrates the use of the pro作者: 寬敞 時(shí)間: 2025-3-28 01:43 作者: CHOKE 時(shí)間: 2025-3-28 02:36
Importing Data into Power BI Desktop,ion or suppression. However, minimizing the information loss by .-anonymous microaggregation is an NP-hard optimization problem for .. Not only computing optimal solutions efficiently is unlikely, nontrivial approximations are lacking, too. Therefore, a bunch of heuristics all with at least quadrati作者: 收養(yǎng) 時(shí)間: 2025-3-28 09:44
Beginning Oracle SQL for Oracle Database 18cextend the modeling in?[.] with trusted execution environments (TEEs), modify the way we model . encryption, and in addition to the properties verified in?[.], we verify weak post-compromise security (PCS) as well as the secrecy and integrity of some additional data used as part of the protocol.作者: 緩和 時(shí)間: 2025-3-28 14:00
Using Table/Record Data Controls functions that check for the single unique input that is expected. In this study we extend initial analysis of SBHA against state-of-the-art dynamic symbolic execution (DSE) attacks in recovering embedded program secrets and consider the limits of an attacker that recovers the logic circuit netlist作者: Breach 時(shí)間: 2025-3-28 17:51
Importing Data into Power Pivotdividual consumption load patterns. We propose an unsupervised attack framework to recover hourly energy consumption time-series of users without any background information. We construct the problem of assigning aggregated energy consumption meter readings to individual users as a mathematical assig作者: MOAN 時(shí)間: 2025-3-28 21:45
The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of ty or contamination within chemical formulas or mathematical expressions can lead to erroneous perception or misunderstanding of the meaning. Special requirements for digital copies are also imposed when digitizing rare editions and archival documents that are of scientific and historical value not 作者: Contracture 時(shí)間: 2025-3-28 23:14
An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspectivert video platform background. It considers China’s short video interactive environment and divides the cultural content into the cultural vision unit and cultural audition unit according to the sensory marketing theory. Through testing numerous EMG video content based on the covariance analysis meth作者: originality 時(shí)間: 2025-3-29 05:47
Technology Transfer and Valuation Methods in Use by University Technology Transfer Officescluding researchers, research units, universities, businesses, and the larger society. Investing in early-stage technology or technology that is novel and has an inventive step can imply a high-risk investment. High-quality information and advice are needed, and valuation methods are required, to su作者: overwrought 時(shí)間: 2025-3-29 08:01
Improved Protection of User Data Through the Use of a Traceable Anonymous One Time Passwordnally Identifiable Information (PII) to the service providers thereby subjecting user data to possible online leakage and consequently putting the safety of the user at risk. This paper is proposing enhancing the protection of user PII using a traceable One Time Password (OTP) derived from the RFC 6作者: 是突襲 時(shí)間: 2025-3-29 13:56
Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment on business information systems. It expands previous research by reporting on a second iteration of an educational design experiment in S/4 HANA. Design elements were composed into a playful layout and associations with a non-learning-context were included, in order to create a more relaxed learnin作者: Decongestant 時(shí)間: 2025-3-29 15:47
Digital Transformation and Management of Transfer in University Platformsuniversities are no longer seen as “ivory towers” in which research is cut off from the rest of the society, but rather as establishments with a profound knowledge and technology transfer. However, transfer often still occurs in an uncoordinated manner without distinct processes or coordination. A d作者: CRUMB 時(shí)間: 2025-3-29 22:10
A Method for?Bottleneck Detection, Prediction, and?Recommendation Using Process Mining Techniquesrily focused on bottleneck detection and resolution, with limited attention given to the prediction of bottlenecks and recommendations for improving process performance. As a result, operational support for bottleneck resolution is often partially or not realized. The aim of this paper is to propose作者: orthopedist 時(shí)間: 2025-3-30 01:33 作者: SENT 時(shí)間: 2025-3-30 07:13 作者: 有花 時(shí)間: 2025-3-30 12:15 作者: OCTO 時(shí)間: 2025-3-30 14:35
Extended Formal Analysis of?the?EDHOC Protocol in?Tamarinrely under such limitations. For a few years, the Internet Engineering Task Force (IETF) has been working to standardize EDHOC, an authenticated key establishment protocol for such constrained IoT devices. The first version of EDHOC was proposed in 2016. In 2018, Bruni et al.?[.] used the ProVerif t作者: 付出 時(shí)間: 2025-3-30 17:53 作者: STERN 時(shí)間: 2025-3-30 22:17
Evaluating Defensive Countermeasures for?Software-Based Hardware Abstraction domain, software obfuscation provides less than perfect protection against such attacks since there is no perfect obfuscator for all classes of programs. However, semantic preserving transformations can attempt to make the cost of attacks prohibitive in either time or resources. Software-based hard作者: irreducible 時(shí)間: 2025-3-31 00:52 作者: START 時(shí)間: 2025-3-31 08:44 作者: 健談 時(shí)間: 2025-3-31 09:41 作者: 指耕作 時(shí)間: 2025-3-31 16:24 作者: 蕁麻 時(shí)間: 2025-3-31 18:02
Digital Transformation and Management of Transfer in University Platformsigital transformation of transfer activities could support and make universities fit for the future of transfer. Therefore, this paper does not only propose a framework for digital transformation of transfer, but also points out the importance of platforms and collaboration of universities. 作者: 我悲傷 時(shí)間: 2025-3-31 23:31 作者: Junction 時(shí)間: 2025-4-1 05:53 作者: Decline 時(shí)間: 2025-4-1 07:10 作者: ADAGE 時(shí)間: 2025-4-1 14:14
Managing the Machine Learning Life Cycle,nces among Chinese EMGs, this paper divides them into seven main groups and promotes the multi-group analysis, aiming to present specific results for each major group. The research findings can guide EMG video producers to improve their video content and contribute to Chinese EMG cultural protection and cultural diversity.作者: photophobia 時(shí)間: 2025-4-1 16:39
Developing the OSO Application,to enrich students’ learning experience and to avoid monotony. This paper contributes to the body of knowledge by providing lessons learned from a radical conversion of a traditional face-to-face course into a digital distant learning environment using elements of gamification, self-paced learning, and learning from mistakes.