標(biāo)題: Titlebook: Natural Disasters and Sustainable Development; Riccardo Casale,Claudio Margottini Book 2004 Springer-Verlag Berlin Heidelberg 2004 Disaste [打印本頁(yè)] 作者: mandatory 時(shí)間: 2025-3-21 18:07
書(shū)目名稱(chēng)Natural Disasters and Sustainable Development影響因子(影響力)
書(shū)目名稱(chēng)Natural Disasters and Sustainable Development影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Natural Disasters and Sustainable Development網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Natural Disasters and Sustainable Development網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Natural Disasters and Sustainable Development被引頻次
書(shū)目名稱(chēng)Natural Disasters and Sustainable Development被引頻次學(xué)科排名
書(shū)目名稱(chēng)Natural Disasters and Sustainable Development年度引用
書(shū)目名稱(chēng)Natural Disasters and Sustainable Development年度引用學(xué)科排名
書(shū)目名稱(chēng)Natural Disasters and Sustainable Development讀者反饋
書(shū)目名稱(chēng)Natural Disasters and Sustainable Development讀者反饋學(xué)科排名
作者: Atheroma 時(shí)間: 2025-3-21 23:54 作者: 圣人 時(shí)間: 2025-3-22 00:36 作者: Jogging 時(shí)間: 2025-3-22 05:30 作者: noxious 時(shí)間: 2025-3-22 11:14
G. Fierrotamps can either be collected non-intrusively from raw network traces (such as pcaps, logs) or using traditional methods, such as interviews, observations and surveys. Our experience showed that traditional methods, such as self-reporting, fail at high-speed and complex exercises. The suggested meth作者: frivolous 時(shí)間: 2025-3-22 14:46 作者: 藥物 時(shí)間: 2025-3-22 19:13 作者: HEPA-filter 時(shí)間: 2025-3-22 23:48
M. Borga,S. Fattorellirver and hence the data owner is kept as light as possible. Our scheme is provably secure against two malicious cloud servers in the random oracle model: one performing the attribute-based encryption process, and the other performing the keyword search process on the encrypted data. We implement our作者: 沐浴 時(shí)間: 2025-3-23 04:52 作者: 半圓鑿 時(shí)間: 2025-3-23 08:00
P. G. Samuelss. The results show that participants consider the interface straightforward and useful. Our solution encourages them to think critically about privacy and question some of the manufacturers’ claims. Participants also reported that they would be glad if such tools were widely available, to further i作者: 不能仁慈 時(shí)間: 2025-3-23 12:12
C. Soccodatos. The results show that participants consider the interface straightforward and useful. Our solution encourages them to think critically about privacy and question some of the manufacturers’ claims. Participants also reported that they would be glad if such tools were widely available, to further i作者: conceal 時(shí)間: 2025-3-23 17:33 作者: 半球 時(shí)間: 2025-3-23 21:27 作者: 有幫助 時(shí)間: 2025-3-24 01:21 作者: 腐蝕 時(shí)間: 2025-3-24 05:52 作者: 使熄滅 時(shí)間: 2025-3-24 08:39
M. Panizzaor the security analysis by optimal key selection in LWSA technique; here Adaptive Particle Swarm Optimization (APSO) is used. Moreover, this methodology is applying full encryption to image transmission over WSNs by offloading the computational outstanding task at hand of sensors to a server. The p作者: 模仿 時(shí)間: 2025-3-24 13:28
A. Corsini,M. Soldati encrypting information (cryptography) or hiding it (steganography), [1]. In this case, we are looking for formulas allowing information (sometimes also confidential) to be split in a way that makes its retrieval possible only for authorised persons. Information undergoing this procedure may be secr作者: fastness 時(shí)間: 2025-3-24 14:57 作者: DENT 時(shí)間: 2025-3-24 22:44 作者: 啞巴 時(shí)間: 2025-3-25 00:12 作者: 我不死扛 時(shí)間: 2025-3-25 06:10 作者: WITH 時(shí)間: 2025-3-25 10:27 作者: troponins 時(shí)間: 2025-3-25 13:49
Book 2004red outcome of the new frontier. This book falls into this new category: multidisciplinary interventions and socio-economic point of views are the basic inputs for a changing science, implementing sustainable development for the benefit of citizens and society. It is comprised of studies and investi作者: Ischemia 時(shí)間: 2025-3-25 19:46
C. Margottiniedia security, and discuss practical of topics experiences and new developments. They cover a wide spectrum inc1uding network security, web security, protocols 978-1-4757-6487-1978-0-387-35568-9Series ISSN 1868-4238 Series E-ISSN 1868-422X 作者: AGONY 時(shí)間: 2025-3-25 22:25 作者: 他很靈活 時(shí)間: 2025-3-26 02:58
978-3-642-07580-3Springer-Verlag Berlin Heidelberg 2004作者: aptitude 時(shí)間: 2025-3-26 05:24
Natural Disasters and Sustainable Development978-3-662-08905-7Series ISSN 1863-5520 Series E-ISSN 1863-5539 作者: STING 時(shí)間: 2025-3-26 11:43
Upwelling of the Sea over the Past 11.5 cal kyr ,A complete digest of everything published up to 1997 concerning sea-level rise (SLR) over the past 20 000 years can be found in . by P. A. Pirazzoli (1997).作者: 地名表 時(shí)間: 2025-3-26 15:22
Snow AvalanchesSnow avalanches represent a threat to societies in many countries of the world. In America, Asia, Australia, and Europe, several mountainous countries are affected by this type of natural hazard. People, housing areas, communication lines, ski areas, animals, and woodland are subjected to the threat of snow avalanches.作者: sed-rate 時(shí)間: 2025-3-26 18:10 作者: Melanoma 時(shí)間: 2025-3-27 00:16
Natural Disasters and Sustainable Development: From Theory to Practice in Italy?It is a well-known fact that the environment has become a fundamental aspect in land planning. Environmental issues influence decision-making and have brought about the creation of new regulatory and analytical instruments.作者: Ganglion-Cyst 時(shí)間: 2025-3-27 02:42
Environmental Science and Engineeringhttp://image.papertrans.cn/n/image/661720.jpg作者: 蛙鳴聲 時(shí)間: 2025-3-27 05:46
https://doi.org/10.1007/978-3-662-08905-7Disasters; Engineering Ecology; Erosion; Landslide News; Natural Hazard; climate change; sustainability; su作者: intellect 時(shí)間: 2025-3-27 09:47 作者: 表皮 時(shí)間: 2025-3-27 17:31
Landslide Susceptibility Mapping: A Methodological Approachring, on the one hand, the .,which are the landslides actually observed, and on the other hand, the .,which are the elements predisposing to landslide phenomena (Panizza and Piacente 1978; Panizza 1996) (Fig. 11.1). According to Brabb (1984),‘..’作者: 割公牛膨脹 時(shí)間: 2025-3-27 19:14 作者: Vulnerable 時(shí)間: 2025-3-27 22:10 作者: 補(bǔ)充 時(shí)間: 2025-3-28 03:30 作者: 闡明 時(shí)間: 2025-3-28 07:20 作者: affinity 時(shí)間: 2025-3-28 13:40
A Brief Overview of Hydrological Modelling 1995 (Munich Reinsurance 1997) and over 10 000 in 1997 (Munich Reinsurance 1998). This lecture covers the important topic of means of assessing the hydrological risk of flooding from rivers through the use of models. It should be stressed that in a single lecture it is only possible to provide a br作者: entail 時(shí)間: 2025-3-28 17:52
Slope Instabilities and Restauration in the Historical Town of Orvieto geographical positioning has made it a naturally fortified city. It has consequently never had to be surrounded by man made fortified walls. It dominates the broad valley of the river Paglia, a tributary of the Tiber. The tuff outcrop, on whose plateau Orvieto sits, rises like an island in the broa作者: esthetician 時(shí)間: 2025-3-28 21:21
Heavy Rainfall Hazards parts of the world, summer drought and heavy rains are basically the two major climatic hazards. The second one (snow problems and road accidents excepted) is not dangerous because of itself, but because of its consequences: floods and landslides.作者: epicardium 時(shí)間: 2025-3-29 00:07
Land Use Planning in Hazard Mitigation: Intervening in Social and Systemic Vulnerabilities — An Applical hazards, on the other modelling the behaviour of the built environment and the capabilities of structural measures. However, in the last years, there has been a growing concern for promoting a dialogue among all those disciplines in order to achieve more practical models guiding preventive meas作者: 改革運(yùn)動(dòng) 時(shí)間: 2025-3-29 04:51 作者: 強(qiáng)所 時(shí)間: 2025-3-29 10:50
Application of an Integrated Method for Landslide Hazard Assessment in the Area of Corvara in Badia e framework of the NEWTECH Project (New technologies for landslide hazard assessment and management in Europe) funded by the Environment and Climate Programme of the European Union (Corsini et al. 1998a,b, 1999). The research involved a team of scientists from the Department of Earth Sciences of Mod作者: CROAK 時(shí)間: 2025-3-29 13:44 作者: Defraud 時(shí)間: 2025-3-29 15:34
Integrated Investigations on Landslides — The Example of the Super Sauze Earthflowuper Sauze landslide is an interesting example of the complex landslides that occurred in clays or marls, with flows following a slide, flow taken in accordance with the terminology defined in ., edited by the International Association of Geomorphologists (Publication no. 5, Report no. 1 of the Euro作者: 郊外 時(shí)間: 2025-3-29 21:52 作者: Hamper 時(shí)間: 2025-3-30 00:51
However, evidence of learning outcomes is often anecdotal and not validated. This paper focuses on measuring learning outcomes of technical cyber defense exercises (CDXs) with Red and Blue teaming elements. We studied learning at Locked Shields, which is the largest unclassified defensive live-fire作者: 推遲 時(shí)間: 2025-3-30 04:20 作者: Endoscope 時(shí)間: 2025-3-30 11:10
F. Antonioli However, evidence of learning outcomes is often anecdotal and not validated. This paper focuses on measuring learning outcomes of technical cyber defense exercises (CDXs) with Red and Blue teaming elements. We studied learning at Locked Shields, which is the largest unclassified defensive live-fire作者: 無(wú)能力 時(shí)間: 2025-3-30 14:53
G. Delmonaco,C. Margottinintent can be personalized by using the viewing histories of each viewer. Viewing histories however contain private data that must be handled with care. A verifiable attribute-based keyword search (VABKS) scheme allows data users (service providers), whose attributes satisfy a policy that is specifie作者: PLE 時(shí)間: 2025-3-30 19:05 作者: 阻塞 時(shí)間: 2025-3-30 21:01
E. Todiniernet brings new features and convenience, but it also poses new security threats, such as IoT malware. IoT malware has shown similar growth, making IoT devices highly vulnerable to remote compromise. However, most IoT malware variants do not exhibit the ability to gain ., as they typically lose con作者: Handedness 時(shí)間: 2025-3-31 01:04
P. G. Samuelsls arises with the growing number of IoT products and the privacy implications of their use. This research is further motivated by legal acts, such as the . (GDPR), which mandates the communication of privacy practices in a clear language. Our solution summarizes key privacy facts and visualizes inf作者: REP 時(shí)間: 2025-3-31 05:54 作者: Minikin 時(shí)間: 2025-3-31 10:06 作者: INERT 時(shí)間: 2025-3-31 16:05 作者: 小蟲(chóng) 時(shí)間: 2025-3-31 20:19
K. Lieduage model where concurrent objects interact by asynchronous method calls and futures. The aim is to prevent leakage of secure information to low-level viewers. The approach is based on a notion of ., where a wrapper encloses an object or a component and controls its interactions with the environmen作者: Frisky 時(shí)間: 2025-3-31 22:18