標(biāo)題: Titlebook: Enterprise Security; Second International Victor Chang,Muthu Ramachandran,Gary Wills Conference proceedings 2017 Springer International Pub [打印本頁] 作者: 板條箱 時(shí)間: 2025-3-21 16:06
書目名稱Enterprise Security影響因子(影響力)
書目名稱Enterprise Security影響因子(影響力)學(xué)科排名
書目名稱Enterprise Security網(wǎng)絡(luò)公開度
書目名稱Enterprise Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Enterprise Security被引頻次
書目名稱Enterprise Security被引頻次學(xué)科排名
書目名稱Enterprise Security年度引用
書目名稱Enterprise Security年度引用學(xué)科排名
書目名稱Enterprise Security讀者反饋
書目名稱Enterprise Security讀者反饋學(xué)科排名
作者: 讓你明白 時(shí)間: 2025-3-21 21:07 作者: 策略 時(shí)間: 2025-3-22 02:57
The Relationship Between Public Budgeting and Risk Management: Competition or Driving?,ing that government is the risk manager of last resort, government faces a vast variety of risks and disasters, either natural or manmade. Owing to scarce public resources and increasing public needs, government is not capable to finance all risk management programs. However, once a catastrophic eve作者: accordance 時(shí)間: 2025-3-22 07:48 作者: syring 時(shí)間: 2025-3-22 09:51
Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning,t when maliciousness is detected in the traffic. A security administrator inspects these alerts and takes corrective action to protect the network from intrusions and unauthorized access. Manual inspection of the alerts is also necessary because anomaly based intrusion detection systems have a high 作者: epidermis 時(shí)間: 2025-3-22 13:28 作者: epidermis 時(shí)間: 2025-3-22 18:53
Robust Enterprise Application Security with eTRON Architecture,ning prevalence at all sectors and levels of enterprises, including government, commerce, education and health. As modern-day enterprise services become progressively virtual in terms of content, storage and delivery, the need for robust of security and privacy pertaining to such services increases 作者: 能量守恒 時(shí)間: 2025-3-22 23:09
Obfuscation and Diversification for Securing Cloud Computing,o provide their services to their customers, with greater ease and higher efficiency. Utilizing the cloud-based services, on one hand has brought along numerous compelling benefits and, on the other hand, has raised concerns regarding the security and privacy of the data on the cloud, which is still作者: Entropion 時(shí)間: 2025-3-23 01:49
An Approach to Organizational Cybersecurity,he United States Department of Defense (DoD) has large networked systems that span the globe, crossing multiple intra-organizational systems. This larger network includes Information Systems typical of enterprise networks, SCADA Systems monitoring critical infrastructure, newer Cyber-physical system作者: LANCE 時(shí)間: 2025-3-23 06:26 作者: 拋媚眼 時(shí)間: 2025-3-23 13:31
Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud,otection of data and the management of their business information systems. Hence, security is often defined as the protection of information, the system, and hardware; that use, store and relocates that information. Governing information and the secure use of Information Technology (IT) is essential作者: 證實(shí) 時(shí)間: 2025-3-23 17:01 作者: jaundiced 時(shí)間: 2025-3-23 21:22 作者: crutch 時(shí)間: 2025-3-23 22:54 作者: myriad 時(shí)間: 2025-3-24 03:07 作者: BIAS 時(shí)間: 2025-3-24 09:14
https://doi.org/10.1007/978-1-4615-0693-5act that iris pattern of individuals are unique, differentiable from left to right eye and is almost stable over the time. However, performance of the existing iris recognition systems depends on the signal processing algorithms they use for iris segmentation, feature extraction and template matchin作者: asthma 時(shí)間: 2025-3-24 13:14 作者: BOOM 時(shí)間: 2025-3-24 16:36 作者: Mast-Cell 時(shí)間: 2025-3-24 19:19
ECG beat detection using wavelet denoising,ning prevalence at all sectors and levels of enterprises, including government, commerce, education and health. As modern-day enterprise services become progressively virtual in terms of content, storage and delivery, the need for robust of security and privacy pertaining to such services increases 作者: iodides 時(shí)間: 2025-3-25 01:54
Pharmakokinetik der Neuroleptikao provide their services to their customers, with greater ease and higher efficiency. Utilizing the cloud-based services, on one hand has brought along numerous compelling benefits and, on the other hand, has raised concerns regarding the security and privacy of the data on the cloud, which is still作者: habile 時(shí)間: 2025-3-25 06:05
https://doi.org/10.1007/978-94-009-4496-1he United States Department of Defense (DoD) has large networked systems that span the globe, crossing multiple intra-organizational systems. This larger network includes Information Systems typical of enterprise networks, SCADA Systems monitoring critical infrastructure, newer Cyber-physical system作者: 薄荷醇 時(shí)間: 2025-3-25 08:48 作者: Pessary 時(shí)間: 2025-3-25 13:43 作者: 能量守恒 時(shí)間: 2025-3-25 16:28
M. Barracó-Serra,Maa Adriá-Casasially in multi-site enterprises or when sharing e-documents with third party. For that purpose, enterprises use document management software. However, document leakage is the most challenging security issue. These leaks are mainly caused by internal attack wither intentional or due to accident and e作者: ACME 時(shí)間: 2025-3-25 21:34
https://doi.org/10.1007/978-3-319-54380-2Computer Science; Informatics; Conference Proceedings; Research; Applications; algorithm analysis and pro作者: Cholagogue 時(shí)間: 2025-3-26 03:33
Victor Chang,Muthu Ramachandran,Gary WillsIncludes supplementary material: 作者: 細(xì)絲 時(shí)間: 2025-3-26 06:38 作者: 詩集 時(shí)間: 2025-3-26 11:02
978-3-319-54379-6Springer International Publishing AG 2017作者: 環(huán)形 時(shí)間: 2025-3-26 13:53 作者: 我怕被刺穿 時(shí)間: 2025-3-26 20:22
Conference proceedings 2017people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjunction with CloudCom 2015..The 11 papers were selected from 24 submissions and provide a comprehensiv作者: 領(lǐng)導(dǎo)權(quán) 時(shí)間: 2025-3-27 00:13 作者: venous-leak 時(shí)間: 2025-3-27 01:37
Iris Biometrics Recognition in Security Management,an be deteriorated as the level of noise increases. The building block of the iris recognition systems, techniques to mitigate the effect of the noise in each stages, criteria to assess the performance of different iris recognition techniques and publicly available iris datasets are discussed in this chapter.作者: BAIL 時(shí)間: 2025-3-27 05:41
0302-9743 ments, platforms and services to work with people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjunction with CloudCom 2015..The 11 papers were selected fro作者: 背心 時(shí)間: 2025-3-27 10:19 作者: AFFIX 時(shí)間: 2025-3-27 16:09
0302-9743 wnership, trust, unauthorized access and big data ownership, studies and analysis to reduce risks imposed by data leakage, hacking and challenges of Cloud forensics.978-3-319-54379-6978-3-319-54380-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Watemelon 時(shí)間: 2025-3-27 17:50 作者: neologism 時(shí)間: 2025-3-28 01:08
Obfuscation and Diversification for Securing Cloud Computing,d . techniques. We present the state-of-the-art review in this field of study, how these two techniques have been used in cloud computing to improve security. Finally, we propose an approach that uses these two techniques with the aim of improving the security in cloud computing environment and preserve the privacy of its users.作者: BLOT 時(shí)間: 2025-3-28 03:02
Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud other cloud security approaches, starting with the concept of using proper measurement for a cloud security assurance model. We demonstrate how this approach can be applied, not only to the approach under review, but how it may be applied to address other cloud security requirements.作者: 浪費(fèi)時(shí)間 時(shí)間: 2025-3-28 09:24 作者: 警告 時(shí)間: 2025-3-28 14:10 作者: 會(huì)犯錯(cuò)誤 時(shí)間: 2025-3-28 15:23 作者: 脆弱帶來 時(shí)間: 2025-3-28 18:49 作者: ABYSS 時(shí)間: 2025-3-29 01:00
https://doi.org/10.1057/9780230589988 generally serves as a facilitator and catalyst to risk and disaster management; and risk and disaster management is mostly a competitor in budget process; and severe unexpected disasters and crises drive and overshadow budgets to deal with the serious consequences ever incurred. This essay suggests作者: 嗎啡 時(shí)間: 2025-3-29 06:56 作者: 柳樹;枯黃 時(shí)間: 2025-3-29 08:06 作者: 細(xì)微差別 時(shí)間: 2025-3-29 15:01
ECG beat detection using wavelet denoising,tual authentication, encrypted communication and strong access control. Besides the security features, the eTRON architecture also offers a wide range of functionalities through a coherent set of API commands so that programmers can develop value-added services in a transparent manner. This chapter 作者: constitute 時(shí)間: 2025-3-29 18:53 作者: AV-node 時(shí)間: 2025-3-29 23:29
Egon H?rbst,Gerd Sandweg,Stefan Wallstabrganization by the board of directors and executive management in order to ensure the success of the organization. ITG and ISG are integral part of corporate governance. ITG is about the structure that links IT processes, resources and information to support organisation’s objectives. IT brings seve作者: Flinch 時(shí)間: 2025-3-30 00:25 作者: ALTER 時(shí)間: 2025-3-30 05:13
Challenges of Cloud Forensics,stablished forensic procedures and process models require major changes in order to be acceptable in cloud environment. This chapter aims to assess challenges that forensic examiners face in tracking down and using digital information stored in the cloud and discuss the importance of education and t作者: 馬籠頭 時(shí)間: 2025-3-30 09:32 作者: Tremor 時(shí)間: 2025-3-30 12:33
Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning,. We analyze IP flows in every cluster and assign an attack label to them. After the clusters are created, an incoming malicious IP flow is compared with all clusters and the label of the closest cluster is assigned to the IP flow. The intrusion detection system uses labeled flows to raise consolida作者: 小隔間 時(shí)間: 2025-3-30 18:54 作者: 大方不好 時(shí)間: 2025-3-31 00:11