標題: Titlebook: Information and Cyber Security; 18th International C Hein Venter,Marianne Loock,Jan Eloff Conference proceedings 2020 Springer Nature Switz [打印本頁] 作者: Gram114 時間: 2025-3-21 18:51
書目名稱Information and Cyber Security影響因子(影響力)
書目名稱Information and Cyber Security影響因子(影響力)學科排名
書目名稱Information and Cyber Security網(wǎng)絡(luò)公開度
書目名稱Information and Cyber Security網(wǎng)絡(luò)公開度學科排名
書目名稱Information and Cyber Security被引頻次
書目名稱Information and Cyber Security被引頻次學科排名
書目名稱Information and Cyber Security年度引用
書目名稱Information and Cyber Security年度引用學科排名
書目名稱Information and Cyber Security讀者反饋
書目名稱Information and Cyber Security讀者反饋學科排名
作者: ANTH 時間: 2025-3-22 00:17 作者: 無所不知 時間: 2025-3-22 00:48 作者: alleviate 時間: 2025-3-22 08:13 作者: Creatinine-Test 時間: 2025-3-22 09:20 作者: 滔滔不絕的人 時間: 2025-3-22 13:13
Sophia Moganedi,Dalenca Pottasn methods, such as the polymerase chain reaction (PCR), have proved to be very useful diagnostic procedures, conventional methods, such as cell culture and serology, still play an important role in viral diagnostics. Despite the fact that modern serological assays, such as enzyme-linked immunosorben作者: Gossamer 時間: 2025-3-22 20:12
Lelethu Zazaza,H. S. Venter,George Sibiyaoteins interact with those of the host cell. The most widely used method to identify interactions between viral and cellular proteins in the infected cell is that of co-immunoprecipitation; lysates from infected cells are treated with antibody which recognises, say, a viral protein of interest, and 作者: 壟斷 時間: 2025-3-22 21:47
Abdramane Bah,Pascal André,Christian Attiogbé,Jacqueline Konate “immediate early” (IE), follows entry of the virus into the host cell. It is independent of de novo synthesis of viral proteins. In general, a second (“early”) phase follows, when a number of regulatory proteins and viral enzymes are synthesized. During the third phase (“l(fā)ate”), which begins with o作者: muster 時間: 2025-3-23 01:48 作者: Felicitous 時間: 2025-3-23 08:38
Gershon Hutchinson,Jacques Ophoffirus. In light of the clinical importance of CMV as a pathogen, increasing efforts are being made to understand the immune response to CMV and how it relates to protection from severe clinical disease. The genome of CMV is 230 kilobases and has the capacity to code for aproximately 200 proteins, eac作者: hedonic 時間: 2025-3-23 10:15 作者: 正論 時間: 2025-3-23 16:38 作者: 按等級 時間: 2025-3-23 22:04 作者: 變化無常 時間: 2025-3-24 01:00
ional activities. Since most of these structures change during development, one of the problems in biology is to understand how these structures are established. In dealing with morphogenesis at the subcellular level, it is advisable to differentiate between the processes of . and .. The molecular b作者: 玉米 時間: 2025-3-24 03:38
Information Security Cost Reduction Through Social Means, information security management and more on sociological solutions. In this paper cost saving information security initiatives are identified and a framework is proposed for organizational and behavioral change in technical human resources, to better address information security concerns.作者: GOUGE 時間: 2025-3-24 08:42
A Management Decision Support System for Evaluating Information Security Behaviour,f that possess the required expertise to confidently make security decisions. The purpose of this paper is to present a decision support system that can analyse, and provide insight into, information security behaviour in an organisation, all the while supporting management decision-making for organ作者: harangue 時間: 2025-3-24 12:16
An Aviation Sector CSIRT for Sub-Saharan Africa,rity Hub (SACH) acts as a national point of contact for the coordination of cybersecurity incidents in South Africa, but to date has only been successful in assisting with the establishment of a finance sector CSIRT. No mention of a transport or critical infrastructure sector CSIRT, under which an a作者: 致命 時間: 2025-3-24 17:13 作者: 奇思怪想 時間: 2025-3-24 21:31 作者: HALO 時間: 2025-3-25 02:15 作者: Fatten 時間: 2025-3-25 04:40 作者: 甜得發(fā)膩 時間: 2025-3-25 08:48
Security Aspects of an Empirical Study into the Impact of Digital Transformation via Unified Communogies impacting productivity and innovation within a global automotive enterprise. The rationale for the study came from a desire to address the challenge of integrating the complex technology landscape of the Internet of Things in the daily lives of people. This study explored the impact of digitiz作者: 指耕作 時間: 2025-3-25 11:59 作者: Crater 時間: 2025-3-25 17:46
Theorising Information Security Policy Violations,edia reflect the huge financial loss and reputational harm to organisations due to computer related security breaches. Although technical safeguards are indispensable, the academic literature highlights the ‘insider threat’. Organisational employees pose a significant threat, considering, they alrea作者: WAIL 時間: 2025-3-25 20:36
An Institutional Trust Perspective of Cloud Adoption Among SMEs in South Africa,MEs. By drawing from Giddens’ (1990) institutional trust theory and the existing IT trust literature, we developed a conceptual model to improve our understanding of the role of institutional trust between SMEs and cloud service providers. The model was also deployed as a sensitizing framework to de作者: 表兩個 時間: 2025-3-26 00:37 作者: 顛簸下上 時間: 2025-3-26 07:34
Information Security Cost Reduction Through Social Means, information security management and more on sociological solutions. In this paper cost saving information security initiatives are identified and a framework is proposed for organizational and behavioral change in technical human resources, to better address information security concerns.作者: Recessive 時間: 2025-3-26 10:16 作者: 救護車 時間: 2025-3-26 16:26 作者: TOXIC 時間: 2025-3-26 19:23
Information and Cyber Security978-3-030-43276-8Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: orient 時間: 2025-3-26 23:19 作者: conflate 時間: 2025-3-27 01:14
PAUDIT: A Distributed Data Architecture for Fitness Data,OD servers. The audit information allows medical aid providers to verify if users may have changed fitness data. PAUDIT describes an architecture that allows medical aid providers to verify the validity of fitness data.作者: 思想靈活 時間: 2025-3-27 07:18 作者: 知道 時間: 2025-3-27 09:28 作者: inspired 時間: 2025-3-27 16:19
1865-0929 g, South Africa, in August 2019..The 12 revised full papers presented were carefully reviewed and selected from 35 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving proto作者: 不愛防注射 時間: 2025-3-27 19:32 作者: molest 時間: 2025-3-28 01:19 作者: 食品室 時間: 2025-3-28 04:16 作者: dyspareunia 時間: 2025-3-28 10:04
Theorising Information Security Policy Violations,e. These theories are examined for theoretical development. A problem area is identified and subsequently, a theoretical model is proposed in an attempt to explain: Why employees violate information systems security policies?作者: HARD 時間: 2025-3-28 12:04
,Data Privacy Compliance Benefits for Organisations – A Cyber-Physical Systems and Internet of Thinge benefits that can be derived from data privacy compliance as it applies to a particular subset of information technology systems, namely cyber-physical systems and Internet of Things technologies. A baseline list of data privacy compliance benefits, contextualised for CPSs and IoT with the South African legal landscape is proposed.作者: Gudgeon 時間: 2025-3-28 16:47 作者: DRILL 時間: 2025-3-28 19:00
Sunthoshan G. Govender,Elmarie Kritzinger,Marianne Loockpy. Surrounding the capsid, some particles, presumably the complete infectious unit, possessed an outer membrane or envelope. This envelope increased the diameter of the complete virion to about 180 nm. It is now known that all viruses belonging to the herpes group share this morphology. The morphol作者: 做事過頭 時間: 2025-3-28 23:34
Dirk Snyman,Hennie Krugerh immunity may remain operative despite immunosuppressive measures after transplantation, particularly if it is humoral immunity. No reactivation infection will occur if the virus does not remain latent in the host or if reactivation is prevented by immunity.作者: Middle-Ear 時間: 2025-3-29 06:39 作者: 厭惡 時間: 2025-3-29 09:41 作者: 悲觀 時間: 2025-3-29 14:42 作者: Communal 時間: 2025-3-29 15:38 作者: Tremor 時間: 2025-3-29 19:58
Abdramane Bah,Pascal André,Christian Attiogbé,Jacqueline Konatens of human cytomegalovirus (HCMV) (W. and S. 1982; M.D. and S. 1983; W. et al. 1984; D.M. 1981). The IE RNA of HCMV arises from a few distinct regions of the viral genome. The region of highest transcriptional activity is localized between map units 0.66 and 0.77 in the genomes of all HCMV strains 作者: 不規(guī)則的跳動 時間: 2025-3-30 02:21
Anthony Bolton,Leila Goosen,Elmarie KritzingerV vaccine is dependent upon progress in studies of both the virology and immunology of CMV. In this review, I will first summarize what is currently known about the protein structure of human CMV. In that section I will focus on those proteins and glycoproteins that have either been characterized ac作者: backdrop 時間: 2025-3-30 04:32