派博傳思國際中心

標(biāo)題: Titlebook: IT Convergence and Security 2012; Kuinam J. Kim,Kyung-Yong Chung Conference proceedings 2013 Springer Science+Business Media Dordrecht 201 [打印本頁]

作者: 添加劑    時間: 2025-3-21 18:07
書目名稱IT Convergence and Security 2012影響因子(影響力)




書目名稱IT Convergence and Security 2012影響因子(影響力)學(xué)科排名




書目名稱IT Convergence and Security 2012網(wǎng)絡(luò)公開度




書目名稱IT Convergence and Security 2012網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱IT Convergence and Security 2012被引頻次




書目名稱IT Convergence and Security 2012被引頻次學(xué)科排名




書目名稱IT Convergence and Security 2012年度引用




書目名稱IT Convergence and Security 2012年度引用學(xué)科排名




書目名稱IT Convergence and Security 2012讀者反饋




書目名稱IT Convergence and Security 2012讀者反饋學(xué)科排名





作者: 喃喃而言    時間: 2025-3-21 20:26

作者: GIST    時間: 2025-3-22 01:11

作者: TERRA    時間: 2025-3-22 08:32
A Secure Self-Encryption Scheme for Resource Limited Mobile Devicesself, but the statistical correlations are effectively removed from the novel randomization process. It gives a solution to overcome weaknesses of the original SE scheme and the complexity to make adversaries it difficult to launch a brute force attack, and satisfies a 0/1 uniformity of key and ciph
作者: 灰姑娘    時間: 2025-3-22 09:26
Fangming Zhao,Takashi Nishide,Yoshiaki Hori,Kouichi Sakurai
作者: Charlatan    時間: 2025-3-22 14:09

作者: 惡名聲    時間: 2025-3-22 21:00
Younjung Kim,Young-Ho Lee,Kyung-Yong Chung,Kang-Dae Lee
作者: Allergic    時間: 2025-3-22 22:03
1876-1100 udies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security..978-94-024-0071-7978-94-007-5860-5Series ISSN 1876-1100 Series E-ISSN 1876-1119
作者: 定點    時間: 2025-3-23 02:26

作者: interrogate    時間: 2025-3-23 06:46

作者: cancer    時間: 2025-3-23 13:17
Hong-Koo Kang,Ji-Sang Kim,Byung-Ik Kim,Hyun-Cheol Jeongindustry.....Oxide and carbon based thin films for electronics and sustainable energy.....Theory, calculations and modeling of nanostructured materials...978-3-642-26687-4978-3-642-14673-2Series ISSN 1869-8433 Series E-ISSN 1869-8441
作者: 用肘    時間: 2025-3-23 17:13

作者: 臨時抱佛腳    時間: 2025-3-23 20:58
Jun-Cheol Jeonindustry.....Oxide and carbon based thin films for electronics and sustainable energy.....Theory, calculations and modeling of nanostructured materials...978-3-642-26687-4978-3-642-14673-2Series ISSN 1869-8433 Series E-ISSN 1869-8441
作者: 灌輸    時間: 2025-3-24 01:47

作者: Epidural-Space    時間: 2025-3-24 05:13
Jeong-Hyun Lim,Chang-Woo Song,Kyung-Yong Chung,Ki-Wook Rim,Jung-Hyun Leeindustry.....Oxide and carbon based thin films for electronics and sustainable energy.....Theory, calculations and modeling of nanostructured materials...978-3-642-26687-4978-3-642-14673-2Series ISSN 1869-8433 Series E-ISSN 1869-8441
作者: Introduction    時間: 2025-3-24 08:03
Seung-Jae Yoo,Jeong-Mo Yang,Hwan-Seok Yangindustry.....Oxide and carbon based thin films for electronics and sustainable energy.....Theory, calculations and modeling of nanostructured materials...978-3-642-26687-4978-3-642-14673-2Series ISSN 1869-8433 Series E-ISSN 1869-8441
作者: 航海太平洋    時間: 2025-3-24 12:48
Yongjoo Shin,Seungjae Shin,Minsoo Kim,Hyunsoo Yoon with sensing applications, linking the local hybridization of carbon atoms and its modification by functionalization to specific device performance. This book is a must-have in the library of any scientist involved in carbon based sensing application..978-3-319-37716-2978-3-319-08648-4
作者: preeclampsia    時間: 2025-3-24 16:08

作者: myalgia    時間: 2025-3-24 22:39
Myung-Ki Jung,Seongjin Ahnd was considered for chemical sensing. In fact the chemical stability and the close-to-metallic conductivity of diamond make it a powerful tool for electrochemical detection in various environment. Furthermore, the diamond is an ideal substrate for surface functionalization thanks to the wide and ve
作者: obeisance    時間: 2025-3-25 01:44

作者: RODE    時間: 2025-3-25 05:25
Study of Behavior-Based High Speed Visit/Inspection Technology to Detect Malicious Websitesalware without users’ knowledge. Special care is particularly needed with regard to Websites that are popular with users, since their infection with malware can greatly extend the scope of any damage. Damage caused by malware can be minimized by detecting malicious sites and taking the necessary cou
作者: Mystic    時間: 2025-3-25 07:38

作者: Blatant    時間: 2025-3-25 12:44

作者: 譏諷    時間: 2025-3-25 19:31
Forensic Evidence Collection Procedures of Smartphone in Crime Sceneprove criminal charge in the forensic process of criminal accident. Since the digital evidential matter could be easily spoiled, fabricated and disappeared, it needs to secure the criminal related evidence promptly as applicable according to clear procedures when investigate the initial scene of acc
作者: 投票    時間: 2025-3-25 23:25
NAC System Analysis and Design for Improvement Modelen the secrets leaked or waste of computer resources of corporate and then this cause the huge social losses. In order to protect the company’s high technology and information the companies should take appropriate information security measures for information security themselves. In this paper, we w
作者: FIN    時間: 2025-3-26 00:08
Analysis of Methods for Detecting Compromised Nodes and its Countermeasuresnd its countermeasure in the sensor network. We first review common attacks in the sensor network application which can compromise a valid, resource-constrained node (or called device). Then, we introduce several standard detection approaches to show their characteristics in different applications o
作者: prodrome    時間: 2025-3-26 07:38

作者: 星球的光亮度    時間: 2025-3-26 09:12

作者: staging    時間: 2025-3-26 14:40

作者: contradict    時間: 2025-3-26 17:09
A Study About Security Awareness Program Based on RFID Access Control Systems is proposed. In addition, it is applied to security awareness programs for improving security recognition and to contribute to the protection of important information. The security awareness program proposed in this study is able to detect the violation in physical security policies and to impleme
作者: 馬具    時間: 2025-3-26 22:30
A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Averageng in a loss of the financial IT systems. Accordingly, this paper based on ‘framework standards of financial transaction detection and response’ was designed to propose of anomaly Electronic Financial Transaction (EFT) pattern recognition and response for the method to detect anomaly prior behaviors
作者: gospel    時間: 2025-3-27 02:27
An Investigation on the Research Topics in Relation to Information Systems in Supply Chain Managemen research is to predicthow IS research is likely to evolve in the near future and to suggest to which direction it should be further conducted. We attempted to investigate the previous research topics about information systems in the fields of SCM on the basis of 96 journal articles published betwee
作者: 陰險    時間: 2025-3-27 07:00
Designing a Model for Context Awareness Based Reliable Auction-Recommending System (CARARS) by Utiliontexts users prefer, users cannot rely on the recommended property, but must analyze its investment value or request experts to analyze it. To solve this problem, advanced information in the real estate auction, an analysis of rights, an analysis of commercial quarters, and a development plan, are
作者: 責(zé)任    時間: 2025-3-27 10:54

作者: anticipate    時間: 2025-3-27 15:05

作者: 專心    時間: 2025-3-27 21:25
aterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi
作者: 悄悄移動    時間: 2025-3-27 22:38
aterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi
作者: 原來    時間: 2025-3-28 04:02
Hong-Koo Kang,Ji-Sang Kim,Byung-Ik Kim,Hyun-Cheol Jeongaterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi
作者: 公理    時間: 2025-3-28 07:46

作者: 炸壞    時間: 2025-3-28 13:06
Jun-Cheol Jeonaterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi
作者: Rinne-Test    時間: 2025-3-28 17:12
Mohamed Ahmed Mohamed Ali,Mohd Aizaini Maarofaterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi
作者: entrance    時間: 2025-3-28 21:22
Jeong-Hyun Lim,Chang-Woo Song,Kyung-Yong Chung,Ki-Wook Rim,Jung-Hyun Leeaterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi
作者: 充氣球    時間: 2025-3-28 23:05
Seung-Jae Yoo,Jeong-Mo Yang,Hwan-Seok Yangaterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi
作者: Irrepressible    時間: 2025-3-29 06:05
Yongjoo Shin,Seungjae Shin,Minsoo Kim,Hyunsoo Yoonplication.Discusses all forms of carbon for sensing devices,.This book reveals why carbon is playing such an increasingly prominent role as a sensing material. The various steps that transform a raw material in a sensing device are thoroughly presented and critically discussed.?The authors deal with
作者: Chronic    時間: 2025-3-29 08:16

作者: 酷熱    時間: 2025-3-29 15:01

作者: amygdala    時間: 2025-3-29 16:12

作者: 陳列    時間: 2025-3-29 22:10
https://doi.org/10.1007/978-94-007-5860-5Access Control; Application Convergence; Artificial Immune System; Artificial Intelligence; Biomedical D
作者: boisterous    時間: 2025-3-30 01:29

作者: 冬眠    時間: 2025-3-30 04:14

作者: 易受騙    時間: 2025-3-30 08:33

作者: 狂亂    時間: 2025-3-30 14:56
Conference proceedings 2013cause we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly edu
作者: incredulity    時間: 2025-3-30 17:10

作者: 闡明    時間: 2025-3-30 23:17
A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Averageesigned to propose of anomaly Electronic Financial Transaction (EFT) pattern recognition and response for the method to detect anomaly prior behaviors and transaction patterns of users. It was applied to moving average based on the statistical basis.
作者: 掙扎    時間: 2025-3-31 03:05
1876-1100 urity.Written by an international team of contributors.Inclu.The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of th
作者: Exaggerate    時間: 2025-3-31 07:58

作者: prolate    時間: 2025-3-31 12:32

作者: Biofeedback    時間: 2025-3-31 15:40





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
白沙| 蒙自县| 阳信县| 合江县| 穆棱市| 安化县| 积石山| 甘泉县| 万州区| 无极县| 广饶县| 赫章县| 县级市| 油尖旺区| 通许县| 阜南县| 类乌齐县| 临湘市| 河北区| 南投县| 阿拉尔市| 济源市| 新蔡县| 东阿县| 弥渡县| 洞口县| 息烽县| 睢宁县| 丰都县| 东丰县| 尚志市| 响水县| 昌乐县| 绥江县| 德阳市| 大兴区| 南通市| 凤翔县| 万源市| 松滋市| 绥棱县|