標(biāo)題: Titlebook: Information and Cyber Security; 19th International C Hein Venter,Marianne Loock,Reinhardt Botha Conference proceedings 2020 Springer Nature [打印本頁(yè)] 作者: ABS 時(shí)間: 2025-3-21 17:45
書(shū)目名稱(chēng)Information and Cyber Security影響因子(影響力)
書(shū)目名稱(chēng)Information and Cyber Security影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Information and Cyber Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Information and Cyber Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Information and Cyber Security被引頻次
書(shū)目名稱(chēng)Information and Cyber Security被引頻次學(xué)科排名
書(shū)目名稱(chēng)Information and Cyber Security年度引用
書(shū)目名稱(chēng)Information and Cyber Security年度引用學(xué)科排名
書(shū)目名稱(chēng)Information and Cyber Security讀者反饋
書(shū)目名稱(chēng)Information and Cyber Security讀者反饋學(xué)科排名
作者: 開(kāi)花期女 時(shí)間: 2025-3-21 22:55 作者: Charade 時(shí)間: 2025-3-22 02:43 作者: Assault 時(shí)間: 2025-3-22 05:58 作者: 容易生皺紋 時(shí)間: 2025-3-22 11:13
Exploring Emotion Detection as a Possible Aid in Speaker Authentication,of an emotion detection system and the value of each feature. Although the results from such a system may not be accurate enough to base an authentication decision on, additional security-related measures may be warranted if possible duress is detected.作者: Painstaking 時(shí)間: 2025-3-22 15:36 作者: 切掉 時(shí)間: 2025-3-22 20:19
Ebenhaeser Otto Janse van Rensburg,Reinhardt A. Botha,Rossouw Von Solms作者: 彈藥 時(shí)間: 2025-3-22 23:54
1865-0929 -of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; and distributed systems security..978-3-030-66038-3978-3-030-66039-0Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: refine 時(shí)間: 2025-3-23 02:24 作者: Graphite 時(shí)間: 2025-3-23 07:40
Johan von Solms,Josef Langermanechanism of secondary wall formation in differentiating tracheary elements and guard cells and to focus especially on those structures and processes at the cell wall-cyto- plasmic interface that seems to be responsible for Controlling the location of wall formation and the orientation of cellulose d作者: majestic 時(shí)間: 2025-3-23 13:44 作者: 上坡 時(shí)間: 2025-3-23 15:50 作者: Affectation 時(shí)間: 2025-3-23 20:00 作者: wall-stress 時(shí)間: 2025-3-24 02:05 作者: affect 時(shí)間: 2025-3-24 04:26 作者: mettlesome 時(shí)間: 2025-3-24 08:42 作者: 彎彎曲曲 時(shí)間: 2025-3-24 11:13 作者: diskitis 時(shí)間: 2025-3-24 17:47 作者: elastic 時(shí)間: 2025-3-24 21:48 作者: adhesive 時(shí)間: 2025-3-25 00:19
Protecting Personal Data Within a South African Organisation,have transformed to a point where society can access copious amounts of information at the touch of a button, almost anywhere in the world and at any time. This access to information has raised new questions and concerns regarding privacy and the organisations that have access to personal informatio作者: CHECK 時(shí)間: 2025-3-25 04:18 作者: Clinch 時(shí)間: 2025-3-25 08:13 作者: 存心 時(shí)間: 2025-3-25 14:38 作者: 察覺(jué) 時(shí)間: 2025-3-25 17:18 作者: 休息 時(shí)間: 2025-3-25 20:36
A Critical Evaluation of Validation Practices in the Forensic Acquisition of Digital Evidence in Sorform as intended. In terms of Sect.?15 of the Electronic Communications and Transactions Act 25 of 2002 in South Africa, validation would contribute to the reliability of the digital evidence. A sample of digital forensic practitioners from South Africa was studied to determine to what extent they 作者: EXALT 時(shí)間: 2025-3-26 02:20
Investigating Customer-Facing Security Features on South African E-commerce Websites,data as they should be. Instead they often choose convenience over security. There are those who argue that e-vendors do not provide the necessary environment to adequately protect their customers’ data by utilizing multi-factor authentication and by providing customer support that educates and enco作者: 同謀 時(shí)間: 2025-3-26 06:06 作者: 運(yùn)動(dòng)性 時(shí)間: 2025-3-26 09:41
Johan von Solms,Josef Langermannd places in which a cell will strain in response to the internally generated turgor stress (Green 1980). To understand morphogenesis one must explain the mechanism of cell wall formation and in particular how unique patterns of cellulose reinforcements arise. Two cell types that possess specific wa作者: 的事物 時(shí)間: 2025-3-26 13:28
Stephanie Teufel,Bernd Teufel,Mohammad Aldabbas,Minh Nguyen" (polarity and unequal division of the plant protoplast) in which for the first time results of experimental plant cytomorphogenesis were re- viewed. This book was based completely on light microscopic observations and rather simple experimental techniques. Since then our knowledge of basic cytomor作者: BADGE 時(shí)間: 2025-3-26 19:50 作者: 記成螞蟻 時(shí)間: 2025-3-26 21:03 作者: Constitution 時(shí)間: 2025-3-27 01:18 作者: jaunty 時(shí)間: 2025-3-27 05:25
Risk Forecasting Automation on the Basis of MEHARI,h will help to reveal the risk value at any time point. This method forms the basis for predicting the probability of a targeted cyberattack?[.]. The established risk level will help to optimize the information security budget and redistribute it to strengthen the most vulnerable areas.作者: 使無(wú)效 時(shí)間: 2025-3-27 12:47
1865-0929 h was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic..The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyb作者: 完全 時(shí)間: 2025-3-27 16:35
Security Education, Training, and Awareness: Incorporating a Social Marketing Approach for Behaviou, developing a deeper understanding of the target audience, and using theory-informed intervention strategies for changing behaviour. The SETA development process provides a sound basis for future empirical work that will include focus groups and action research.作者: 善于騙人 時(shí)間: 2025-3-27 20:01
A Critical Evaluation of Validation Practices in the Forensic Acquisition of Digital Evidence in Sont concerns, with no validation done, or no proof of validation done, bringing into question the reliability of the digital evidence in court. It is concerning that the justice system itself is not picking this up, meaning that potentially unreliable digital evidence is used in court.作者: PON 時(shí)間: 2025-3-27 23:33
Conference proceedings 2020osed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic..The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyber) forens作者: 無(wú)辜 時(shí)間: 2025-3-28 06:02 作者: 易受刺激 時(shí)間: 2025-3-28 07:28
Gyanendra Chaubey,Siddhartha Kumar Arjariayzed. For simulation, open-source Network Simulator NS3 is used which takes lesser time to set up the network, provides a precise level of simulation for wireless networks, and minutely mimics real-world wireless networks scenarios. Simulations show that for a single antenna of 5?GHz band at 80?MHz 作者: intelligible 時(shí)間: 2025-3-28 10:57 作者: 盤(pán)旋 時(shí)間: 2025-3-28 16:14 作者: 拋棄的貨物 時(shí)間: 2025-3-28 22:11
Book 2024nd die darin stattfindenden Interaktionen als diskursive Praxis, in der ein spezifisches Wissen .in, über .und. angesichts. von Sprache relevant gemacht wird. Für Subjektivierung ist jenes Wissen hochgradig wirkm?chtig und bleibt den Akteur*innen im Prozess der schulischen Enkulturation doch gr??ten作者: Affirm 時(shí)間: 2025-3-28 23:00 作者: 天賦 時(shí)間: 2025-3-29 04:40
mprehensive set of application-development features that include Extensible Application Markup Language (XAML), controls, data binding, and layout. The concepts discussed in this chapter will also lay a foundation for Chapter 13, in which we look at creating the new Windows Store app user interface