派博傳思國際中心

標(biāo)題: Titlebook: Blockchain and Other Emerging Technologies for Digital Business Strategies; Hamid Jahankhani,David V. Kilpin,Stefan Kendziersk Book 2022 T [打印本頁]

作者: CULT    時(shí)間: 2025-3-21 16:22
書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies影響因子(影響力)




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies影響因子(影響力)學(xué)科排名




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies網(wǎng)絡(luò)公開度




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies被引頻次




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies被引頻次學(xué)科排名




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies年度引用




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies年度引用學(xué)科排名




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies讀者反饋




書目名稱Blockchain and Other Emerging Technologies for Digital Business Strategies讀者反饋學(xué)科排名





作者: declamation    時(shí)間: 2025-3-21 20:16
Advanced Sciences and Technologies for Security Applicationshttp://image.papertrans.cn/b/image/189225.jpg
作者: Vsd168    時(shí)間: 2025-3-22 00:57

作者: 填滿    時(shí)間: 2025-3-22 07:13

作者: Ergots    時(shí)間: 2025-3-22 10:04

作者: 咯咯笑    時(shí)間: 2025-3-22 16:42

作者: Endometrium    時(shí)間: 2025-3-22 19:45
Innovation policy for mobile media,lder patient group suffers from Mild Cognitive Impairment and dementia. According to the World Health Organization, currently 55 million people worldwide suffer from dementia only. The projection is 75 million in 2030 and 132 million by 2050 (WHO, 2021). Mild Cognitive Impairment is often the first
作者: 600    時(shí)間: 2025-3-22 21:47
https://doi.org/10.1007/b139034ganisations to reconsider their processes, their business model, and their ways of working. However, whilst many organisations have embarked on a digital transformation, cyber resilience is not always considered, causing many transformations to lead to greater vulnerabilities and a higher exposure t
作者: AVANT    時(shí)間: 2025-3-23 03:32

作者: Ovulation    時(shí)間: 2025-3-23 06:06

作者: Canvas    時(shí)間: 2025-3-23 12:37

作者: voluble    時(shí)間: 2025-3-23 17:27
Innovation policy for mobile media,d upon the rise of technology, competitive market, and legal and regulatory compliances. Teichert (Acta Univ Agriculturae Silviculturae Mendelianae Brunensis 67:1673–1687, [.]) observe this condition as the reason for forcing the business plans and policies of organizations to adapt to technological
作者: DRAFT    時(shí)間: 2025-3-23 20:50

作者: insurrection    時(shí)間: 2025-3-23 22:44

作者: Exclude    時(shí)間: 2025-3-24 05:52
Blockchain and Other Emerging Technologies for Digital Business Strategies978-3-030-98225-6Series ISSN 1613-5113 Series E-ISSN 2363-9466
作者: 音樂學(xué)者    時(shí)間: 2025-3-24 07:47
Cybersecurity Challenges in Small and Medium Enterprise (SMEs),eir reach, and thereby improving value producing opportunities. It also brought the small businesses additional responsibilities of having to deal with the security risks and threats which are ever-present on the digital platform. This chapter aims to review and analyse the cybersecurity risks in sm
作者: Optometrist    時(shí)間: 2025-3-24 12:43

作者: Carcinoma    時(shí)間: 2025-3-24 17:00
Video Camera in the Ambient Assisted Living System. Health Versus Privacy,lder patient group suffers from Mild Cognitive Impairment and dementia. According to the World Health Organization, currently 55 million people worldwide suffer from dementia only. The projection is 75 million in 2030 and 132 million by 2050 (WHO, 2021). Mild Cognitive Impairment is often the first
作者: Presbycusis    時(shí)間: 2025-3-24 23:01

作者: CORE    時(shí)間: 2025-3-25 00:34

作者: 機(jī)構(gòu)    時(shí)間: 2025-3-25 07:20
Emerging Technologies: Blockchain and Smart Contracts,ain technology and Smart Contracts. A discussion is made on nodes, consensus mechanisms, digital signatures and cryptographic hashes, types of blockchains, Ethereum, and Smart Contracts benefits.After that, it explores the distributed ledger technology (DLT) and blockchain as a subset of DLT in grea
作者: 偏離    時(shí)間: 2025-3-25 07:50
An Investigation into How Smartphones Can Be Secured Against MiTM Attacks: Financial Sector,rity and are conceivably the most productive types of cyberattacks utilised today. The increasing use of personal devices like smartphones connecting to the internet via Wi-Fi has made wireless attacks on users more crucial. The cyber adversary becomes a “middleman” between two targets to intercept
作者: Legion    時(shí)間: 2025-3-25 12:27
Digital Transformation, Leadership, and Markets,d upon the rise of technology, competitive market, and legal and regulatory compliances. Teichert (Acta Univ Agriculturae Silviculturae Mendelianae Brunensis 67:1673–1687, [.]) observe this condition as the reason for forcing the business plans and policies of organizations to adapt to technological
作者: SAGE    時(shí)間: 2025-3-25 16:05
Challenges and Opportunities of Autonomous Cyber Defence (ACyD) Against Cyber Attacks,o generated threats and how these threats needs to be dealt with. This research focuses on the use of Artificial Intelligence (AI), Machine learning (ML) and Deep learning (DL) to mitigate auto-generated cyber attacks which are hard to track and neutralise. Hence, the key issue that the research pro
作者: BARGE    時(shí)間: 2025-3-25 23:24

作者: 蝕刻術(shù)    時(shí)間: 2025-3-26 00:21
Book 2022nationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills..
作者: 完成才會征服    時(shí)間: 2025-3-26 07:33

作者: 說笑    時(shí)間: 2025-3-26 08:36
Artificial Intelligence Based Malicious Traffic Detection,proposed model is tested using two different datasets, a dataset created in a virtual lab environment, and an IoT-23 dataset. The performance of the proposed AI model is tested on the metrics of ‘a(chǎn)ccuracy’ and ‘loss’. The model performed well in distinguishing the network traffic on both the dataset
作者: 堅(jiān)毅    時(shí)間: 2025-3-26 14:21
An Examination of How the Interaction Between Senior IT Managers and C-Level Executives Impacts on at strong leadership was required to make certain that cyber resilience was included in digital transformation projects. In addition to this it must be seen and accepted that Cyber Resilience is an organizational issue for there to be a real impact. The relationship between the board and their view
作者: 忍耐    時(shí)間: 2025-3-26 19:33

作者: Benzodiazepines    時(shí)間: 2025-3-27 00:03
Digital Transformation, Leadership, and Markets,reas to consider while an organization plan on a digital transformation project as process transformation, business model transformation, domain transformation, cultural/organizational transformation. The benefit of a successful digital transformation according to the author is improved processes, f
作者: 攤位    時(shí)間: 2025-3-27 05:06

作者: 節(jié)省    時(shí)間: 2025-3-27 08:03
Secure Deployment of IOT Devices,study, we tried to educate normal users to securely deploy IoT devices. To achieve this goal, we have provided a set of best practices collected from existing standard frameworks. We have demonstrated the implementation of these security measures in two different scenarios using various network devi
作者: Digitalis    時(shí)間: 2025-3-27 13:28
1613-5113 ademia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills..978-3-030-98227-0978-3-030-98225-6Series ISSN 1613-5113 Series E-ISSN 2363-9466
作者: thrombosis    時(shí)間: 2025-3-27 17:07

作者: nocturia    時(shí)間: 2025-3-27 19:38

作者: expeditious    時(shí)間: 2025-3-27 23:37

作者: 遺產(chǎn)    時(shí)間: 2025-3-28 03:24

作者: 過份艷麗    時(shí)間: 2025-3-28 09:15
Innovation policy for mobile media, with the sole aim of persistently and autonomously defending all cyber physical systems against cyber attacks. The use of ACyD in cyber defence is a relatively new research area that the author hopes will gain grounds in the future.
作者: Tremor    時(shí)間: 2025-3-28 12:54

作者: 出汗    時(shí)間: 2025-3-28 17:07

作者: 竊喜    時(shí)間: 2025-3-28 21:02





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
浠水县| 余姚市| 新丰县| 河西区| 朝阳市| 晋江市| 桃江县| 南皮县| 县级市| 余江县| 梧州市| 阿克苏市| 博罗县| 太白县| 彭阳县| 浮山县| 清流县| 遵义县| 平阳县| 霍州市| 洛隆县| 武宁县| 浮山县| 广元市| 尤溪县| 葫芦岛市| 馆陶县| 渭南市| 成安县| 常熟市| 桃江县| 五华县| 剑川县| 涞源县| 吉木萨尔县| 寻甸| 曲周县| 昌都县| 兰州市| 卢湾区| 灵山县|