標(biāo)題: Titlebook: IT Convergence and Security 2012; Kuinam J. Kim,Kyung-Yong Chung Conference proceedings 2013 Springer Science+Business Media Dordrecht 201 [打印本頁] 作者: 添加劑 時間: 2025-3-21 18:07
書目名稱IT Convergence and Security 2012影響因子(影響力)
書目名稱IT Convergence and Security 2012影響因子(影響力)學(xué)科排名
書目名稱IT Convergence and Security 2012網(wǎng)絡(luò)公開度
書目名稱IT Convergence and Security 2012網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱IT Convergence and Security 2012被引頻次
書目名稱IT Convergence and Security 2012被引頻次學(xué)科排名
書目名稱IT Convergence and Security 2012年度引用
書目名稱IT Convergence and Security 2012年度引用學(xué)科排名
書目名稱IT Convergence and Security 2012讀者反饋
書目名稱IT Convergence and Security 2012讀者反饋學(xué)科排名
作者: 喃喃而言 時間: 2025-3-21 20:26 作者: GIST 時間: 2025-3-22 01:11 作者: TERRA 時間: 2025-3-22 08:32
A Secure Self-Encryption Scheme for Resource Limited Mobile Devicesself, but the statistical correlations are effectively removed from the novel randomization process. It gives a solution to overcome weaknesses of the original SE scheme and the complexity to make adversaries it difficult to launch a brute force attack, and satisfies a 0/1 uniformity of key and ciph作者: 灰姑娘 時間: 2025-3-22 09:26
Fangming Zhao,Takashi Nishide,Yoshiaki Hori,Kouichi Sakurai作者: Charlatan 時間: 2025-3-22 14:09 作者: 惡名聲 時間: 2025-3-22 21:00
Younjung Kim,Young-Ho Lee,Kyung-Yong Chung,Kang-Dae Lee作者: Allergic 時間: 2025-3-22 22:03
1876-1100 udies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security..978-94-024-0071-7978-94-007-5860-5Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 定點 時間: 2025-3-23 02:26 作者: interrogate 時間: 2025-3-23 06:46 作者: cancer 時間: 2025-3-23 13:17
Hong-Koo Kang,Ji-Sang Kim,Byung-Ik Kim,Hyun-Cheol Jeongindustry.....Oxide and carbon based thin films for electronics and sustainable energy.....Theory, calculations and modeling of nanostructured materials...978-3-642-26687-4978-3-642-14673-2Series ISSN 1869-8433 Series E-ISSN 1869-8441 作者: 用肘 時間: 2025-3-23 17:13 作者: 臨時抱佛腳 時間: 2025-3-23 20:58
Jun-Cheol Jeonindustry.....Oxide and carbon based thin films for electronics and sustainable energy.....Theory, calculations and modeling of nanostructured materials...978-3-642-26687-4978-3-642-14673-2Series ISSN 1869-8433 Series E-ISSN 1869-8441 作者: 灌輸 時間: 2025-3-24 01:47 作者: Epidural-Space 時間: 2025-3-24 05:13
Jeong-Hyun Lim,Chang-Woo Song,Kyung-Yong Chung,Ki-Wook Rim,Jung-Hyun Leeindustry.....Oxide and carbon based thin films for electronics and sustainable energy.....Theory, calculations and modeling of nanostructured materials...978-3-642-26687-4978-3-642-14673-2Series ISSN 1869-8433 Series E-ISSN 1869-8441 作者: Introduction 時間: 2025-3-24 08:03
Seung-Jae Yoo,Jeong-Mo Yang,Hwan-Seok Yangindustry.....Oxide and carbon based thin films for electronics and sustainable energy.....Theory, calculations and modeling of nanostructured materials...978-3-642-26687-4978-3-642-14673-2Series ISSN 1869-8433 Series E-ISSN 1869-8441 作者: 航海太平洋 時間: 2025-3-24 12:48
Yongjoo Shin,Seungjae Shin,Minsoo Kim,Hyunsoo Yoon with sensing applications, linking the local hybridization of carbon atoms and its modification by functionalization to specific device performance. This book is a must-have in the library of any scientist involved in carbon based sensing application..978-3-319-37716-2978-3-319-08648-4作者: preeclampsia 時間: 2025-3-24 16:08 作者: myalgia 時間: 2025-3-24 22:39
Myung-Ki Jung,Seongjin Ahnd was considered for chemical sensing. In fact the chemical stability and the close-to-metallic conductivity of diamond make it a powerful tool for electrochemical detection in various environment. Furthermore, the diamond is an ideal substrate for surface functionalization thanks to the wide and ve作者: obeisance 時間: 2025-3-25 01:44 作者: RODE 時間: 2025-3-25 05:25
Study of Behavior-Based High Speed Visit/Inspection Technology to Detect Malicious Websitesalware without users’ knowledge. Special care is particularly needed with regard to Websites that are popular with users, since their infection with malware can greatly extend the scope of any damage. Damage caused by malware can be minimized by detecting malicious sites and taking the necessary cou作者: Mystic 時間: 2025-3-25 07:38 作者: Blatant 時間: 2025-3-25 12:44 作者: 譏諷 時間: 2025-3-25 19:31
Forensic Evidence Collection Procedures of Smartphone in Crime Sceneprove criminal charge in the forensic process of criminal accident. Since the digital evidential matter could be easily spoiled, fabricated and disappeared, it needs to secure the criminal related evidence promptly as applicable according to clear procedures when investigate the initial scene of acc作者: 投票 時間: 2025-3-25 23:25
NAC System Analysis and Design for Improvement Modelen the secrets leaked or waste of computer resources of corporate and then this cause the huge social losses. In order to protect the company’s high technology and information the companies should take appropriate information security measures for information security themselves. In this paper, we w作者: FIN 時間: 2025-3-26 00:08
Analysis of Methods for Detecting Compromised Nodes and its Countermeasuresnd its countermeasure in the sensor network. We first review common attacks in the sensor network application which can compromise a valid, resource-constrained node (or called device). Then, we introduce several standard detection approaches to show their characteristics in different applications o作者: prodrome 時間: 2025-3-26 07:38 作者: 星球的光亮度 時間: 2025-3-26 09:12 作者: staging 時間: 2025-3-26 14:40 作者: contradict 時間: 2025-3-26 17:09
A Study About Security Awareness Program Based on RFID Access Control Systems is proposed. In addition, it is applied to security awareness programs for improving security recognition and to contribute to the protection of important information. The security awareness program proposed in this study is able to detect the violation in physical security policies and to impleme作者: 馬具 時間: 2025-3-26 22:30
A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Averageng in a loss of the financial IT systems. Accordingly, this paper based on ‘framework standards of financial transaction detection and response’ was designed to propose of anomaly Electronic Financial Transaction (EFT) pattern recognition and response for the method to detect anomaly prior behaviors作者: gospel 時間: 2025-3-27 02:27
An Investigation on the Research Topics in Relation to Information Systems in Supply Chain Managemen research is to predicthow IS research is likely to evolve in the near future and to suggest to which direction it should be further conducted. We attempted to investigate the previous research topics about information systems in the fields of SCM on the basis of 96 journal articles published betwee作者: 陰險 時間: 2025-3-27 07:00
Designing a Model for Context Awareness Based Reliable Auction-Recommending System (CARARS) by Utiliontexts users prefer, users cannot rely on the recommended property, but must analyze its investment value or request experts to analyze it. To solve this problem, advanced information in the real estate auction, an analysis of rights, an analysis of commercial quarters, and a development plan, are 作者: 責(zé)任 時間: 2025-3-27 10:54 作者: anticipate 時間: 2025-3-27 15:05 作者: 專心 時間: 2025-3-27 21:25
aterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi作者: 悄悄移動 時間: 2025-3-27 22:38
aterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi作者: 原來 時間: 2025-3-28 04:02
Hong-Koo Kang,Ji-Sang Kim,Byung-Ik Kim,Hyun-Cheol Jeongaterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi作者: 公理 時間: 2025-3-28 07:46 作者: 炸壞 時間: 2025-3-28 13:06
Jun-Cheol Jeonaterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi作者: Rinne-Test 時間: 2025-3-28 17:12
Mohamed Ahmed Mohamed Ali,Mohd Aizaini Maarofaterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi作者: entrance 時間: 2025-3-28 21:22
Jeong-Hyun Lim,Chang-Woo Song,Kyung-Yong Chung,Ki-Wook Rim,Jung-Hyun Leeaterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi作者: 充氣球 時間: 2025-3-28 23:05
Seung-Jae Yoo,Jeong-Mo Yang,Hwan-Seok Yangaterials.Includes supplementary material: .This volume covers all aspects of carbon and oxide based nanostructured materials. The topics include synthesis, characterization and application of carbon-based namely carbon nanotubes, carbon nanofibres, fullerenes, carbon filled composites etc. In additi作者: Irrepressible 時間: 2025-3-29 06:05
Yongjoo Shin,Seungjae Shin,Minsoo Kim,Hyunsoo Yoonplication.Discusses all forms of carbon for sensing devices,.This book reveals why carbon is playing such an increasingly prominent role as a sensing material. The various steps that transform a raw material in a sensing device are thoroughly presented and critically discussed.?The authors deal with作者: Chronic 時間: 2025-3-29 08:16 作者: 酷熱 時間: 2025-3-29 15:01 作者: amygdala 時間: 2025-3-29 16:12 作者: 陳列 時間: 2025-3-29 22:10
https://doi.org/10.1007/978-94-007-5860-5Access Control; Application Convergence; Artificial Immune System; Artificial Intelligence; Biomedical D作者: boisterous 時間: 2025-3-30 01:29 作者: 冬眠 時間: 2025-3-30 04:14 作者: 易受騙 時間: 2025-3-30 08:33 作者: 狂亂 時間: 2025-3-30 14:56
Conference proceedings 2013cause we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly edu作者: incredulity 時間: 2025-3-30 17:10 作者: 闡明 時間: 2025-3-30 23:17
A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Averageesigned to propose of anomaly Electronic Financial Transaction (EFT) pattern recognition and response for the method to detect anomaly prior behaviors and transaction patterns of users. It was applied to moving average based on the statistical basis.作者: 掙扎 時間: 2025-3-31 03:05
1876-1100 urity.Written by an international team of contributors.Inclu.The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of th作者: Exaggerate 時間: 2025-3-31 07:58 作者: prolate 時間: 2025-3-31 12:32 作者: Biofeedback 時間: 2025-3-31 15:40