標(biāo)題: Titlebook: Information Technology for Peace and Security; IT Applications and Christian Reuter Textbook 20191st edition Springer Fachmedien Wiesbaden [打印本頁(yè)] 作者: Objective 時(shí)間: 2025-3-21 19:27
書目名稱Information Technology for Peace and Security影響因子(影響力)
書目名稱Information Technology for Peace and Security影響因子(影響力)學(xué)科排名
書目名稱Information Technology for Peace and Security網(wǎng)絡(luò)公開度
書目名稱Information Technology for Peace and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Technology for Peace and Security被引頻次
書目名稱Information Technology for Peace and Security被引頻次學(xué)科排名
書目名稱Information Technology for Peace and Security年度引用
書目名稱Information Technology for Peace and Security年度引用學(xué)科排名
書目名稱Information Technology for Peace and Security讀者反饋
書目名稱Information Technology for Peace and Security讀者反饋學(xué)科排名
作者: Lobotomy 時(shí)間: 2025-3-21 22:08
ork (CNN) functioning as the classification algorithm. On the NumtaDB image dataset, the performance is systematically evaluated of this process. Finally, 93% accuracy is obtained for NumtaDB dataset, and 92% accuracy rate is obtained for our own dataset using same of the proposed method in experime作者: 怎樣才咆哮 時(shí)間: 2025-3-22 04:19 作者: intimate 時(shí)間: 2025-3-22 08:02 作者: 定點(diǎn) 時(shí)間: 2025-3-22 10:30 作者: Eructation 時(shí)間: 2025-3-22 14:29
Jürgen Altmanngory’s . (1902) and Eleanor Hull’s . (1909) were among a slew of books targeted at young male readers during the period. While Pearse, unsurprisingly, read a specifically Irish version of admirable boyhood in the stories, the books were, in fact, at least as popular among British schoolboys.作者: 飲料 時(shí)間: 2025-3-22 17:57 作者: exophthalmos 時(shí)間: 2025-3-22 23:46 作者: 開玩笑 時(shí)間: 2025-3-23 04:49 作者: 稀釋前 時(shí)間: 2025-3-23 07:32 作者: AXIS 時(shí)間: 2025-3-23 12:00 作者: 線 時(shí)間: 2025-3-23 17:16
Thea Riebe,Christian Reuterf you do not know how to attack it, so you will attack your test systems in a variety of ways beginning with elementary attacks against browsers and culminating with a case study of the compromise of a defended e-commerce site..The author, who has coached his university’s cyber defense team three ti作者: 幼稚 時(shí)間: 2025-3-23 18:16
Jürgen Altmannses, with a high level of capitalization at Nasdaq, are considered. Electronic technologies of e-document circulation are offered, which can save several hundred million dollars and offer green ecology on the state scale. The technologies of human-free management of social groups are considered on t作者: 愛管閑事 時(shí)間: 2025-3-24 02:02
Legitimate relations are the main part of the SCU, which are based on a metric for measuring the quality of all processes and phenomena. This makes it possible to completely eliminate corruption in the processes of resource distribution and personnel management through metric evaluation of the acti作者: refraction 時(shí)間: 2025-3-24 06:06
Thomas Reinhold,Christian Reuterds to the development of an optimal control mechanism to determine the HVAC energy flexibility while maximizing the monetary incentive for it. At the grid level, it allows formulating a model predictive control scheme to optimally control the ancillary service power flow from buildings, while integr作者: fledged 時(shí)間: 2025-3-24 09:41 作者: 從屬 時(shí)間: 2025-3-24 13:14 作者: 彎曲的人 時(shí)間: 2025-3-24 17:40 作者: instill 時(shí)間: 2025-3-24 22:44 作者: Detain 時(shí)間: 2025-3-24 23:58
Matthias Hollick,Stefan Katzenbeissertion of SDF tasks to hardware. The framework also contains model transformations that cast these models into priced timed-automata models, the input language of the well-known model checker .. We demonstrate how our framework satisfies the requirements of modularity, extensibility and interoperabili作者: verdict 時(shí)間: 2025-3-25 07:21 作者: 娘娘腔 時(shí)間: 2025-3-25 10:58 作者: interior 時(shí)間: 2025-3-25 13:42
Darknets as Tools for Cyber Warfare this chapter, we explain the technology behind ., a widely used Darknet client, provide an overview of common Darknet phenomena and discuss them in context of cyber warfare. Finally, we analyse these discourses within the framework of critical securitisation studies.作者: dysphagia 時(shí)間: 2025-3-25 17:15 作者: 廣口瓶 時(shí)間: 2025-3-25 21:43 作者: 束以馬具 時(shí)間: 2025-3-26 00:40
https://doi.org/10.1007/978-3-658-25652-4Stuxnet; Wannacry; Cyberspace; Information security; NotPetya; Cyber warfare; Information Warfare; Christia作者: CLAIM 時(shí)間: 2025-3-26 07:33
Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature 2019作者: grudging 時(shí)間: 2025-3-26 08:35 作者: LIMN 時(shí)間: 2025-3-26 12:45 作者: conformity 時(shí)間: 2025-3-26 17:59 作者: crucial 時(shí)間: 2025-3-26 21:02
economic development is dictated by fortunes and vagaries prevalent in share stock markets. Researchers have found that it is possible to make forecasts with large historical data on stock market and up-down in prices of share values. So, the fact that stock markets play a really vital role in nati作者: CAGE 時(shí)間: 2025-3-27 02:26
Christian Reuter economic development is dictated by fortunes and vagaries prevalent in share stock markets. Researchers have found that it is possible to make forecasts with large historical data on stock market and up-down in prices of share values. So, the fact that stock markets play a really vital role in nati作者: Isolate 時(shí)間: 2025-3-27 08:33 作者: kindred 時(shí)間: 2025-3-27 12:11 作者: 女上癮 時(shí)間: 2025-3-27 15:03 作者: 一再煩擾 時(shí)間: 2025-3-27 17:50 作者: 建筑師 時(shí)間: 2025-3-27 22:22 作者: macular-edema 時(shí)間: 2025-3-28 04:33 作者: cartilage 時(shí)間: 2025-3-28 09:51
Thomas Reinhold,Christian Reuter, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources..You‘ll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through 作者: 發(fā)炎 時(shí)間: 2025-3-28 11:19 作者: 問(wèn)到了燒瓶 時(shí)間: 2025-3-28 16:06 作者: Curmudgeon 時(shí)間: 2025-3-28 21:23
sses of life of each person. It is necessary to create a new market-oriented model of scientific and educational processes within the smart cyber university (SCU). The concept integrates the achievements of classical universities, technological cyberculture, and humans’ desire for perfection through作者: mosque 時(shí)間: 2025-3-29 00:02 作者: OATH 時(shí)間: 2025-3-29 03:21 作者: neoplasm 時(shí)間: 2025-3-29 07:21 作者: 粉筆 時(shí)間: 2025-3-29 13:08
m different sensors?[.], which are fused to generate a model of the surrounding world. Actors in the generated model are objects, which are e.g., classified as vehicles or pedestrians. The actors run in parallel, as in the real world actions from traffic participants can be taken independently and a作者: SIT 時(shí)間: 2025-3-29 15:56 作者: urethritis 時(shí)間: 2025-3-29 22:58
Matthias Hollick,Stefan Katzenbeisseraches for HW-SW co-design face difficulties coping with the increasing complexity of modern-day application due to, e.g., concurrency and energy constraints. Therefore, an automated modeling approach is needed which satisfies modularity, extensibility and interoperability requirements. Model-Driven 作者: ornithology 時(shí)間: 2025-3-30 02:11
Information Technology for Peace and Security – Introduction and Overviewace and security. This textbook addresses the significance, potentials and challenges of IT for peace and security. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives. In the fo作者: 獨(dú)行者 時(shí)間: 2025-3-30 07:20
IT in Peace, Conflict, and Security Researchpresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in saf作者: 共同時(shí)代 時(shí)間: 2025-3-30 10:44 作者: 搖晃 時(shí)間: 2025-3-30 15:08
Information Warfare – From Doctrine to Permanent Conflictoncept and soon thereafter also the doctrine of Information Warfare in NATO, Warsaw Pact and Asian countries. In all pioneering countries, Information Warfare was meant to use any technological and appropriate non-technological means to disrupt the ability of an adversary to purposefully pursue its 作者: 威脅你 時(shí)間: 2025-3-30 18:15