標(biāo)題: Titlebook: Information Security; 17th International C Hein Venter,Marianne Loock,Jan Eloff Conference proceedings 2019 Springer Nature Switzerland AG [打印本頁] 作者: polysomnography 時(shí)間: 2025-3-21 18:30
書目名稱Information Security影響因子(影響力)
書目名稱Information Security影響因子(影響力)學(xué)科排名
書目名稱Information Security網(wǎng)絡(luò)公開度
書目名稱Information Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security被引頻次
書目名稱Information Security被引頻次學(xué)科排名
書目名稱Information Security年度引用
書目名稱Information Security年度引用學(xué)科排名
書目名稱Information Security讀者反饋
書目名稱Information Security讀者反饋學(xué)科排名
作者: 不透明 時(shí)間: 2025-3-21 21:32
1865-0929 ineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security..978-3-030-11406-0978-3-030-11407-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Delude 時(shí)間: 2025-3-22 00:26
Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in Souessionals to have a Bachelor degree in either Computer Science, Information Systems or Engineering as a minimum qualification along with industry certifications. This paper is an initial exploratory study that can serve as a basis for more specific studies in future.作者: Neuralgia 時(shí)間: 2025-3-22 07:48
Distributed Ledger Technology to Support Digital Evidence Integrity Verification Processes,ests are carried out to independently validate the claims made by the service. The results demonstrate that the OTS service is highly reliable, but not suitable for time-sensitive digital timestamping.作者: ADOPT 時(shí)間: 2025-3-22 12:37
1865-0929 outh Africa, in August 2018...The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocol作者: 攝取 時(shí)間: 2025-3-22 15:53 作者: 寬敞 時(shí)間: 2025-3-22 17:46
Conference proceedings 2019a, in August 2018...The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authori作者: Temporal-Lobe 時(shí)間: 2025-3-22 23:07 作者: Genetics 時(shí)間: 2025-3-23 03:58 作者: macabre 時(shí)間: 2025-3-23 07:19
Information Security978-3-030-11407-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 嚙齒動物 時(shí)間: 2025-3-23 11:15
Communications in Computer and Information Sciencehttp://image.papertrans.cn/i/image/465279.jpg作者: FACT 時(shí)間: 2025-3-23 14:22
e in the field. It explains what we mean by the terms creativity and critique and in so doing highlights the challenging context in which online teaching and learning is taking place. Can online study really replicate the challenges and occasional joy of learning in a face to face environment? Can i作者: Explosive 時(shí)間: 2025-3-23 21:02
William Thomas Weilbach,Yusuf Moosa Motaray proposed by Mihaly Csikszentmihalyi. I have also argued that this model is similar in many ways to the ideas on cultural production developed by Pierre Bourdieu. While they are certainly not identical, both of these views appear to displace the notion of the individual being at the centre of creat作者: goodwill 時(shí)間: 2025-3-23 23:04
Dustin Terence van der Haarular form of cultural production attempted to view itself as an art form. The creative process of the director in particular was seen to be vital to this theory. In many ways this theory was, for film, an attempt to move away from the view that film-making was a collective enterprise based on the cr作者: FLOAT 時(shí)間: 2025-3-24 04:32 作者: heckle 時(shí)間: 2025-3-24 09:25
Edwin Donald Frauenstein investigating creative activity. The evidence, according to both the neo-Marxist views of Wolff and the symbolic interactionist perspective of Becker, amongst many others, supports the idea that creativity can no longer be credited to particular individuals only. Taking the idea that all art is a s作者: penance 時(shí)間: 2025-3-24 14:26
Tetyana Loskutova,Rivaj Parbhuontinue to evolve.Suggests how creativity can be enhanced wiThis book advances an environmental approach to enhancing creativity in schools, by interweaving educational creativity theory with creative industries environmental approaches. Using Anna Craft’s last book Creativity and Education Futures 作者: 上釉彩 時(shí)間: 2025-3-24 14:55
Lelethu Zazaza,H. S. Venter,George Sibiyaontinue to evolve.Suggests how creativity can be enhanced wiThis book advances an environmental approach to enhancing creativity in schools, by interweaving educational creativity theory with creative industries environmental approaches. Using Anna Craft’s last book Creativity and Education Futures 作者: Amnesty 時(shí)間: 2025-3-24 20:02
Jacques Ophoff,Mcguigan Lakay, established theory from Economics/Entrepreneurship (SchumpThe essential problem in entrepreneurship is improving the performance of entrepreneurs. The most important theories will be the ones that most enable us to predict and then ultimately influence entrepreneurial performance. This book develo作者: 拍下盜公款 時(shí)間: 2025-3-25 01:09 作者: 災(zāi)難 時(shí)間: 2025-3-25 05:25
, established theory from Economics/Entrepreneurship (SchumpThe essential problem in entrepreneurship is improving the performance of entrepreneurs. The most important theories will be the ones that most enable us to predict and then ultimately influence entrepreneurial performance. This book develo作者: 扔掉掐死你 時(shí)間: 2025-3-25 10:40 作者: progestin 時(shí)間: 2025-3-25 14:19
Real-Time Face Antispoofing Using Shearlets,e to inexpensive spoofing attacks, which pose a threat to security. Basic face spoofing attacks that use photographs and video are still not addressed appropriately, especially in real-time applications, thereby making security in these environments a difficult task to achieve. Although methods have作者: Hemiplegia 時(shí)間: 2025-3-25 19:12
Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses,er-generated passwords. While research on password policies has been ongoing, this has taken place in the Global North. Accordingly, little is known about the strengths and weaknesses of password policies deployed in the Global South, especially Africa. As such, this study researched password polici作者: Cursory 時(shí)間: 2025-3-25 23:17 作者: 使出神 時(shí)間: 2025-3-26 01:28
Information Availability and Security in Foreign Corrupt Practices Act Investigations,l penalties present a growing concern for businesses operating or planning to start operating abroad. The ratings of Transparency International offer an indicator of corruption in countries; however, the analysis shows that this indicator is not correlated with the occurrence of FCPA cases in a part作者: perimenopause 時(shí)間: 2025-3-26 06:13
The Current State of Electronic Consent Systems in e-Health for Privacy Preservation,g their health information. Placing patients in control of the privacy of their health information ensures that the risks for reputational and personal harm are reduced. Several approaches towards patient consent management solutions, ranging from software prototypes to conceptual models, have been 作者: 截?cái)?nbsp; 時(shí)間: 2025-3-26 09:22
Detecting Manipulated Smartphone Data on Android and iOS Devices,ese devices rich sources of data. This data becomes increasingly important when smartphones are linked to criminal or corporate investigations. To erase data and mislead digital forensic investigations, end-users can manipulate the data and change recorded events. This paper investigates the effects作者: 紅腫 時(shí)間: 2025-3-26 13:53 作者: 集聚成團(tuán) 時(shí)間: 2025-3-26 20:25 作者: 整理 時(shí)間: 2025-3-26 21:00 作者: avenge 時(shí)間: 2025-3-27 03:16
Preventing and Mitigating Ransomware,cks, leading to a large amount of data becoming inaccessible. In a typical ransomware attack malicious software encrypts electronic data while extorting money from an unexpecting victim. In order to decrypt and restore data, the attacker requests user to pay the ransom amount, typically through cryp作者: 小畫像 時(shí)間: 2025-3-27 08:39 作者: WAG 時(shí)間: 2025-3-27 10:06
Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in Souty professionals protect organisations from cybercrime and other cyber threats. A shortage of skills has increased the demand for cyber security professionals. This research study examines the skills, knowledge and qualification requirements that are required of a cyber security professional in Sout作者: bile648 時(shí)間: 2025-3-27 16:42
Real-Time Face Antispoofing Using Shearlets, real and a fake face without user-cooperation. We have found the approach can successfully detect blurred edges, texture changes and other noise found in various face spoof attacks. Our benchmarks on the publicly available CASIA-FASD, MSU-MFSD, and OULU-NPU data sets, show that our approach portray作者: SIT 時(shí)間: 2025-3-27 18:48
Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses,nsidered acceptable on most sites. In addition, some sites did not explicitly display password requirements and only a few sites adopted measures for providing real-time feedback and effective guidance during password generation.作者: 粗糙 時(shí)間: 2025-3-27 22:33 作者: champaign 時(shí)間: 2025-3-28 04:49 作者: LATHE 時(shí)間: 2025-3-28 06:55
Detecting Manipulated Smartphone Data on Android and iOS Devices,uct techniques to detect the changed data. The outcome of this research study successfully demonstrates the manipulation of smartphone data and presents preliminary evidence that the suggested framework can assist with the detection of manipulated smartphone data.作者: 生氣地 時(shí)間: 2025-3-28 11:24 作者: Freeze 時(shí)間: 2025-3-28 15:58
SA-EF Cube: An Evaluation Framework for Assessing Intelligent Context-Aware Critical Information Inmous CIIP solution covers the fundamental requirements to contextualise the problem domain of CIIP. The SA-EF Cube model is by no means exhaustive in nature, serves as solid foundation for an implementation checklist before any CIIP mechanism is contextualised and developed.作者: watertight, 時(shí)間: 2025-3-28 21:31
,Small and Medium-Sized Enterprises’ Understanding of Security Evaluation of Cloud-Based Business InBIs in terms of physically checking for vulnerabilities and data security and were not proficient in performing security evaluations of cloud-based BIs and relied on experts. SMEs face predicaments in evaluating cloud-based BI due to a lack of appropriate tools they can use. The study concluded that作者: indoctrinate 時(shí)間: 2025-3-29 01:15 作者: 庇護(hù) 時(shí)間: 2025-3-29 03:38
Mitigating the Ransomware Threat: A Protection Motivation Theory Approach,wards and response costs both have a significant negative influence on protection motivation. The results provide support for the use of fear appeals and PMT to influence protection motivation in the context of ransomware threats.作者: cruise 時(shí)間: 2025-3-29 08:32 作者: 嘴唇可修剪 時(shí)間: 2025-3-29 15:19 作者: remission 時(shí)間: 2025-3-29 17:13
Heloise Pieterse,Martin Olivier,Renier van Heerden作者: Osteoarthritis 時(shí)間: 2025-3-29 21:16 作者: 和平主義 時(shí)間: 2025-3-30 01:25
William Thomas Weilbach,Yusuf Moosa Motarat individuals can’t help but act in the ways they’ve been predetermined to do. Nor does it accept that individuals are absolutely free to make their own creative decisions regardless of the structures, discourses and so on that surround them. This resolution of the actions of both agency and structu作者: ITCH 時(shí)間: 2025-3-30 04:22
Dustin Terence van der Haartography has been historically looked down upon by the established art world in the West. In 1895 Baudelaire declared photography to be a ‘hand maid to the arts and science, but their very humble handmaid’ (in Wells 2004, p. 13). As recently as 1982 this argument was still causing consternation with作者: 無所不知 時(shí)間: 2025-3-30 12:09 作者: anarchist 時(shí)間: 2025-3-30 14:35
Edwin Donald Frauensteinonly placed a strong emphasis on the text but also stimulated a reappraisal of cultural consumption. In playing their part within this larger project, the poststructuralists not only put in place what can be called the dissolution of certainty but also helped destabilise the idea that the individual作者: 船員 時(shí)間: 2025-3-30 20:31
Tetyana Loskutova,Rivaj Parbhu argues that secondary schools must find a way to make more room for creative risk, innovation and imagination in order to adequately prepare students for creative workplaces and publics..978-1-349-95857-3978-1-137-57224-0Series ISSN 2947-8324 Series E-ISSN 2947-8332 作者: 值得尊敬 時(shí)間: 2025-3-30 22:59
Lelethu Zazaza,H. S. Venter,George Sibiya argues that secondary schools must find a way to make more room for creative risk, innovation and imagination in order to adequately prepare students for creative workplaces and publics..978-1-349-95857-3978-1-137-57224-0Series ISSN 2947-8324 Series E-ISSN 2947-8332 作者: 嚙齒動物 時(shí)間: 2025-3-31 03:45
Amaanullah Parker,Irwin Browned the evidence directly linking entrepreneurial creativity and entrepreneurial performance, concluding that the linkage is both statistically and practically significant. In order to scientifically tie entrepreneurship to creativity the book pursues a number of major objectives: In parts one and tw