標(biāo)題: Titlebook: Information Systems Security; 6th International Co Somesh Jha,Anish Mathuria Conference proceedings 2010 The Editor(s) (if applicable) and [打印本頁] 作者: CLIP 時(shí)間: 2025-3-21 19:36
書目名稱Information Systems Security影響因子(影響力)
書目名稱Information Systems Security影響因子(影響力)學(xué)科排名
書目名稱Information Systems Security網(wǎng)絡(luò)公開度
書目名稱Information Systems Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Systems Security被引頻次
書目名稱Information Systems Security被引頻次學(xué)科排名
書目名稱Information Systems Security年度引用
書目名稱Information Systems Security年度引用學(xué)科排名
書目名稱Information Systems Security讀者反饋
書目名稱Information Systems Security讀者反饋學(xué)科排名
作者: Infuriate 時(shí)間: 2025-3-21 20:47 作者: Tracheotomy 時(shí)間: 2025-3-22 03:27
V. N. Venkatakrishnan,Prithvi Bisht,Mike Ter Louw,Michelle Zhou,Kalpana Gondi,Karthik Thotta Ganeshtheoretical debate and sectoral policies, to that of cultural heritage. The introduction of this new category, codified in Italian legislation at the beginning of this century, has changed the criteria for selecting the objects and activities to be preserved (adding the identity criterion to the pur作者: QUAIL 時(shí)間: 2025-3-22 04:44
Andrew C. Myerst of new buildings in historic cities. This chapter shows that UNESCO and ICOMOS have helped to lay the conceptual foundations for this attitude towards new architecture in historic cities. During the Nara Conference (1994), for example, international heritage experts argued for a more dynamic herit作者: esculent 時(shí)間: 2025-3-22 10:46 作者: 華而不實(shí) 時(shí)間: 2025-3-22 16:27
Arnar Birgisson,Alejandro Russo,Andrei Sabelfeldfferences and similarities between heritage conservation in both national contexts. Especially the development of heritage legislation, institutional and bureaucratic trends and the role of private organizations in both countries are discussed. One of the main differences analyzed is the degree of c作者: 無能力之人 時(shí)間: 2025-3-22 17:15 作者: 衰弱的心 時(shí)間: 2025-3-23 00:32
Mridul Nandi,Stefan Popoveniuc,Poorvi L. Vora from Science and Technology Studies.Richly illustrated with.This book introduces the multilevel perspective to analyze how local, national, and international actors and institutions in the heritage field interact. More specifically, a comparative study is made of controversies regarding six UNESCO 作者: ALIEN 時(shí)間: 2025-3-23 03:24
Michelle Zhou,Prithvi Bisht,V. N. Venkatakrishnanfferences and similarities between heritage conservation in both national contexts. Especially the development of heritage legislation, institutional and bureaucratic trends and the role of private organizations in both countries are discussed. One of the main differences analyzed is the degree of c作者: Missile 時(shí)間: 2025-3-23 08:52
Thanh Binh Dao,Etsuya Shibayamacentury the world faces epochal changes which affect every part of society, including the arenas in which cultural heritage is made, held, collected, curated, exhibited, or simply exists. The book is about these changes; about the decentring of culture and cultural heritage away from institutional s作者: avarice 時(shí)間: 2025-3-23 10:44
Moritz Y. Becker,Alexander Malkis,Laurent Bussardives and photograph agencies, and to make the digitised images available via the European portal, Europeana. The collections spanned 100 years of photography from 1839 to 1939 and many of the photographs depicted individuals and family life during these 100 years. In this contribution we explore the作者: 系列 時(shí)間: 2025-3-23 15:13 作者: 白楊 時(shí)間: 2025-3-23 19:34
Steven Van Acker,Nick Nikiforakis,Pieter Philippaerts,Yves Younan,Frank Piessensa new concept for galleries, libraries, archives and museums (GLAMs). Pointing to a new future for libraries, Negroponte was already aware that being digital had its own reality, which was to create ambiguity in relation to the value of physicality or pure materiality, a reality that the world had b作者: Negligible 時(shí)間: 2025-3-24 00:14 作者: defibrillator 時(shí)間: 2025-3-24 05:37
Fathiyeh Faghih,Morteza Amini,Rasool Jalilie terms the ‘risk society’ (Beck 1992). With regard to Western societies, he identifies their current phase of development as ‘reflexive modernization’. ‘Tradition’ is often cast as the opposite of modernity, and as consequently detrimental to modernization. In this essay, I contend that this is a f作者: 白楊 時(shí)間: 2025-3-24 07:20
Wei Wang,Xiangliang Zhang,Georgios Pitsilisilemmas for archivists, researchers and indigenous groups. The web age has also facilitated access to musical information for the masses at the touch of a keypad, changing the nature of access and contributing to the democratization of knowledge worldwide. As knowledge and the power it provides are 作者: 壯觀的游行 時(shí)間: 2025-3-24 11:13
Raju Halder,Agostino Cortesidential functions, and in some cases abandoning previous agricultural functions. These changes are mostly turbulent, uncontrolled and with little reversibility, often as a result of lack of coherent comprehensive spatial planning in suburban areas. A high volume of anthropogenic processes affects ex作者: ATRIA 時(shí)間: 2025-3-24 17:47 作者: antedate 時(shí)間: 2025-3-24 19:07
Shaoying Cai,Chunhua Su,Yingjiu Li,Robert Deng,Tieyan Litives.Sheds light on the local spaces of power and knowledge.This book highlights the importance of diversity in overcoming issues of social and environmental degradation. It presents conceptual and practical strategies to celebrate local and Indigenous knowledge for improved community development a作者: Parabola 時(shí)間: 2025-3-25 00:32 作者: 物種起源 時(shí)間: 2025-3-25 04:55
WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper)ipting (XSS), SQL Injection and Cross-site Request Forgery (XSRF) are among the topmost threats on the Web, and defending against these attacks is a growing concern. In this paper, we describe ., a framework that is aimed at preventing these attacks on existing (legacy) web applications. The main fe作者: Bumble 時(shí)間: 2025-3-25 08:24 作者: 施加 時(shí)間: 2025-3-25 11:43
Attribution of Malicious Behaviority to identify malicious software (malware) in order to prevent its installation. This approach remains imperfect, resulting in widespread, persistent malware infections, malicious execution, and transmission of undesirable Internet traffic. Over the past several years, we have begun to develop sol作者: 類似思想 時(shí)間: 2025-3-25 18:47 作者: 謙虛的人 時(shí)間: 2025-3-25 21:07
Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Rerent vulnerability or loophole. Attackers can analyze the presence of flaws in a particular binary and exploit them. Traditional virus scanners are also binaries which can be attacked by malware. This paper implements a method known as Remote Attestation entirely in software to attest the integrity作者: 單獨(dú) 時(shí)間: 2025-3-26 03:24 作者: 結(jié)果 時(shí)間: 2025-3-26 05:56 作者: Indecisive 時(shí)間: 2025-3-26 12:19
Coverage Criteria for Automatic Security Testing of Web Applicationsst cost and vulnerability detection effectiveness. Coverage criteria used in traditional software testing such as branch coverage and statement coverage are commonly used but they are not originally defined for security testing purpose. In this paper, we present an overview of the limitations of tho作者: Aerate 時(shí)間: 2025-3-26 14:07
A Practical Generic Privacy Languages and applicability are maximized by keeping the vocabulary and semantics of service behaviours abstract. A privacy-compliant data-handling protocol for a network of communicating principals is described.作者: Lipoma 時(shí)間: 2025-3-26 18:12 作者: 調(diào)色板 時(shí)間: 2025-3-26 23:00 作者: Kidnap 時(shí)間: 2025-3-27 04:37 作者: 金盤是高原 時(shí)間: 2025-3-27 07:30 作者: insert 時(shí)間: 2025-3-27 11:21
Abstracting Audit Data for Lightweight Intrusion Detectionection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clu作者: 痛苦一下 時(shí)間: 2025-3-27 16:02 作者: Dictation 時(shí)間: 2025-3-27 18:58
Security Rules , Security Properties can be expressed, and we identify their role in the description of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies, and we relate them: the rule-based approach consists of specifying the conditions under which an action is grante作者: misshapen 時(shí)間: 2025-3-27 22:29
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chainshe possession of the tag’s secret which is usually only known by its owner. If a “symmetric secret”-based RFID system is deployed in third party logistics (3PL) supply chains, all the three parties (the sender of the goods, the receiver of the goods and the 3PL provider) should have a copy of those 作者: critic 時(shí)間: 2025-3-28 05:05 作者: Soliloquy 時(shí)間: 2025-3-28 09:33 作者: 華而不實(shí) 時(shí)間: 2025-3-28 11:34 作者: 營養(yǎng) 時(shí)間: 2025-3-28 16:15
978-3-642-17713-2The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer-Verlag GmbH, DE作者: 繞著哥哥問 時(shí)間: 2025-3-28 19:59
Information Systems Security978-3-642-17714-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 急急忙忙 時(shí)間: 2025-3-29 01:28
0302-9743 Overview: 978-3-642-17713-2978-3-642-17714-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: hereditary 時(shí)間: 2025-3-29 03:39 作者: 暖昧關(guān)系 時(shí)間: 2025-3-29 10:18
collaborative strategies play a crucial role. This study explores how collaborative strategies enable a sustainable destination development leveraging on cultural heritage. Through an in depth analysis of three emblematic case studies in Italy, this chapter examines how collaborative strategies help作者: Compassionate 時(shí)間: 2025-3-29 13:14 作者: 平躺 時(shí)間: 2025-3-29 15:56
V. N. Venkatakrishnan,Prithvi Bisht,Mike Ter Louw,Michelle Zhou,Kalpana Gondi,Karthik Thotta Ganeshffects, we have analysed the articles published since the end of the last century in the quarterly journal Economia della cultura, which has represented one of the reference points of the Italian and European debate on cultural economics. The analysis is based on textual mining techniques that aim t作者: 潰爛 時(shí)間: 2025-3-29 21:01
Andrew C. Myersral government start to take on more responsibilities in the field of heritage preservation. This changing attitude is partly as a result of the international embarrassment caused by the removal of Dresden from the World Heritage list. After all, the Federal Government finds itself in a difficult po作者: RODE 時(shí)間: 2025-3-30 00:26
Jonathon Giffin,Abhinav Srivastavaionalists and the centralist government in London. The question of who controls Cornwall’s heritage, became even more urgent when the former tin and copper mines of Cornwall were placed on the World Heritage List. This chapter focuses on a controversy surrounding the construction of a supermarket in作者: SSRIS 時(shí)間: 2025-3-30 07:03 作者: 寬度 時(shí)間: 2025-3-30 11:48
Raghunathan Srinivasan,Partha Dasgupta,Tushar Gohad,Amiya Bhattacharyaonomic and political landscape developments, this chapter describes the increasing popularity of heritage in the 1970s. After the 1960s, in which large parts of historic inner cities fell prey to modernist urban planners, more attention was now paid to heritage preservation. In the same period, heri作者: fixed-joint 時(shí)間: 2025-3-30 16:06 作者: 虛弱的神經(jīng) 時(shí)間: 2025-3-30 18:33
Thanh Binh Dao,Etsuya Shibayamas and supporting wider developments such as improvements in education and in artistic careers. Given that spectrum of possible benefits to society, the range of studies that follow here are intended to be a resource and stimulus to help inform not just professionals in the sector but all those with 作者: TIA742 時(shí)間: 2025-3-31 00:32
Moritz Y. Becker,Alexander Malkis,Laurent Bussards chapter discusses the challenges that members of the consortium faced and how they dealt with the challenges as they arose. Finally, the chapter suggests that the copyright strategy developed for the RICHES project that encourages cultural heritage institutions to think about their digitisation pr作者: 青春期 時(shí)間: 2025-3-31 04:10
Ping Chen,Xiao Xing,Hao Han,Bing Mao,Li Xientral to the transmission of tradition. The ephemerality of festivals, as well as the inconvenience, expense, and gentrification-effects to which such large scale events can contribute, has led to questions about their ability to sustain community cohesion and socio-economic wellbeing. Drawing on th作者: hypnotic 時(shí)間: 2025-3-31 05:31
Steven Van Acker,Nick Nikiforakis,Pieter Philippaerts,Yves Younan,Frank Piessensnow available everywhere, people expect a new normal from museums besides mere objects and explanatory texts next to them. As the emblematic medium of contemporary societies games offer engagement methods. Recent marketing strategies such as loyalty games and gamification prove that use of technolog作者: enhance 時(shí)間: 2025-3-31 11:39
Ravi Kumar,Shamik Sural,Arobinda Gupta the foundations, for the first time, for the study of the memory of the exile in the digital domain. We start by recounting the burgeoning creation of websites and social media groups devoted to the republican exile, from 1998 to 2015, and link it with both contemporary Spanish political events and作者: 完成才能戰(zhàn)勝 時(shí)間: 2025-3-31 16:58
Fathiyeh Faghih,Morteza Amini,Rasool Jalilis began to dismantle the welfare state across much of Western Europe, local culture and identity have been harnessed to provide foundations for social and economic growth. For most - and not only the peripheral — regions across Europe, that has meant promoting local and regional ‘heritage’ as a reso作者: 轉(zhuǎn)折點(diǎn) 時(shí)間: 2025-3-31 18:23
Wei Wang,Xiangliang Zhang,Georgios Pitsilisded in different modalities such as the web, commercially available CDs, royalty payments, cultural centre displays, archival collections and indigenous knowledge repositories. These end products obscure their making and the kinds of performances that shape the documentation of indigenous cultural h作者: 柔聲地說 時(shí)間: 2025-4-1 00:54
Raju Halder,Agostino Cortesi a way of protecting environmental structures but also helps building better designed living spaces for the residents of suburbs. This paper aims at characterising and analysing the types of ecological structures of landscape (ecological-spatial models) in suburban communities. The research was cond作者: 包租車船 時(shí)間: 2025-4-1 02:17 作者: 頂點(diǎn) 時(shí)間: 2025-4-1 07:35
and environmental management. This chapter also considers the role of community stakeholder groups and their knowledge in the networks surrounding environmental management and community development. Analysis of the two empirical case studies illuminates that the potential of local community knowled作者: hurricane 時(shí)間: 2025-4-1 12:38