標(biāo)題: Titlebook: Sustainability in Energy Business and Finance; Approaches and Devel Hasan Din?er,Serhat Yüksel Book 2022 The Editor(s) (if applicable) and [打印本頁(yè)] 作者: 鏟除 時(shí)間: 2025-3-21 16:24
書目名稱Sustainability in Energy Business and Finance影響因子(影響力)
書目名稱Sustainability in Energy Business and Finance影響因子(影響力)學(xué)科排名
書目名稱Sustainability in Energy Business and Finance網(wǎng)絡(luò)公開度
書目名稱Sustainability in Energy Business and Finance網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Sustainability in Energy Business and Finance被引頻次
書目名稱Sustainability in Energy Business and Finance被引頻次學(xué)科排名
書目名稱Sustainability in Energy Business and Finance年度引用
書目名稱Sustainability in Energy Business and Finance年度引用學(xué)科排名
書目名稱Sustainability in Energy Business and Finance讀者反饋
書目名稱Sustainability in Energy Business and Finance讀者反饋學(xué)科排名
作者: 嘮叨 時(shí)間: 2025-3-21 21:06
978-3-030-94053-9The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: Genome 時(shí)間: 2025-3-22 00:42 作者: incisive 時(shí)間: 2025-3-22 07:38 作者: sacrum 時(shí)間: 2025-3-22 10:33
https://doi.org/10.1007/978-3-030-94051-5Energy; Sustainabilty; Finance; Economics; Green Management作者: 漂亮才會(huì)豪華 時(shí)間: 2025-3-22 14:17 作者: Extort 時(shí)間: 2025-3-22 17:06
Strategic Talent Perception in the Energy Sector,s strategy will provide a sustainable competitive advantage over their competitors. However, it is seen that there is no strategic talent management policy that has just been written in many businesses, and that the works are generally carried out to meet improvisations and needs. In addition, busin作者: 確定 時(shí)間: 2025-3-22 23:11
Relationships between Energy Efficiency on Output and Energy Efficiency on Carbon Emission,stan. There are two nations, Bangladesh and Nepal, that have a significant indication of unidirectional causal relationship running from CEEU to NOEU. Finally, there is no causal relationship between these two variables in Sri Lanka. GDP per unit use of energy neither is affected nor affect the carb作者: flex336 時(shí)間: 2025-3-23 02:00 作者: 商業(yè)上 時(shí)間: 2025-3-23 09:11 作者: 硬化 時(shí)間: 2025-3-23 11:54 作者: podiatrist 時(shí)間: 2025-3-23 14:40 作者: CURL 時(shí)間: 2025-3-23 18:33
2730-6038 ainable energy business and finance. This book presents multidimensional analyses of sustainability issues with regard to renewable energy projects and identifies the most promising strategies, as well as efficient market conditions for the energy business.? ?978-3-030-94053-9978-3-030-94051-5Series ISSN 2730-6038 Series E-ISSN 2730-6046 作者: Hearten 時(shí)間: 2025-3-24 01:30 作者: cancer 時(shí)間: 2025-3-24 06:25
Laura Baitenova,Lyailya Mutaliyeva,Natalia Sokolinskaya,András Vinczeully address those issues. In this paper, we provide a novel scheme that supports (i) confidentiality for events and filters; (ii) filters can express very complex constraints on events even if brokers are not able to access any information on both events and filters; (iii) and finally it does not r作者: FIN 時(shí)間: 2025-3-24 07:50 作者: intertwine 時(shí)間: 2025-3-24 12:31
Georgy Shilin,Henrik Zsiboracstric to quantify the likelihood of an adversary taking an attack path for compromising an asset in EDS. We empirically evaluated our approach within an ICS test-bed. The results show the significance of our approach for characterizing adversarial behavior and gaining valuable insights on cyber risk 作者: photopsia 時(shí)間: 2025-3-24 15:28
Ahmet Arif Eren,Orhan ?im?ek,Zafer Adal?tric to quantify the likelihood of an adversary taking an attack path for compromising an asset in EDS. We empirically evaluated our approach within an ICS test-bed. The results show the significance of our approach for characterizing adversarial behavior and gaining valuable insights on cyber risk 作者: CHYME 時(shí)間: 2025-3-24 22:22 作者: colostrum 時(shí)間: 2025-3-25 00:54 作者: 積習(xí)已深 時(shí)間: 2025-3-25 06:10 作者: arsenal 時(shí)間: 2025-3-25 08:11 作者: scoliosis 時(shí)間: 2025-3-25 13:48 作者: TEM 時(shí)間: 2025-3-25 19:46
Fatma Ta?demirmethod, dubbed ., which enables automatic feature learning of metamorphic malware via deep learning. Specifically, we encapsulate the information of each call graph into an image that is then fed into deep convolutional neural networks for classifying the malware family. Particularly, due to its bui作者: pineal-gland 時(shí)間: 2025-3-25 22:51 作者: 食料 時(shí)間: 2025-3-26 02:09
Elizaveta Ibragimova,Mir Sayed Shah Danishconsensus algorithm used in the blockchain. We theoretically prove the correctness of BRVM, and implement a prototype based on Quagga and Fabric. Our experiments show that BRVM can solve this kind of promise-violating problem caused by multiple collusion nodes, and about 21% faster than SPIDeR [.] i作者: coagulate 時(shí)間: 2025-3-26 05:00
Ba?ak Gezmene channels gains; and (ii) the user does not know how the noise is distributed among the main channels. We show that in model (i) in his optimal behavior the user transmits signal energy uniformly across a subset of selected channels. In model (ii), if the user does not know the eavesdropper’s chann作者: 四溢 時(shí)間: 2025-3-26 12:25 作者: 輕打 時(shí)間: 2025-3-26 14:55 作者: Sputum 時(shí)間: 2025-3-26 18:38 作者: Antagonism 時(shí)間: 2025-3-27 00:27
Nikita Makarichev,Tomonobu Senjyu,Sergey Prosekov connections going to sensitive domains while enforcing default configurations for the rest of the connections. We demonstrate the feasibility of our proposal by implementing a proof-of-concept as a Firefox browser extension. We envision this mechanism as a built-in security feature in web browsers,作者: 銼屑 時(shí)間: 2025-3-27 04:24
Cans?n Kemal Canand evaluated several identification schemes to identify attackers in the network solely based on network traffic information. We showed that by measuring the packet rate and the uniformity of the packet distances, a reliable identificator can be built, given a training period of the deployment netw作者: 老人病學(xué) 時(shí)間: 2025-3-27 07:44
Book 2022idimensional analyses of sustainability issues with regard to renewable energy projects and identifies the most promising strategies, as well as efficient market conditions for the energy business.? ?作者: buoyant 時(shí)間: 2025-3-27 10:17 作者: 邪惡的你 時(shí)間: 2025-3-27 17:19 作者: 不在灌木叢中 時(shí)間: 2025-3-27 20:52 作者: 歡騰 時(shí)間: 2025-3-27 23:45 作者: 我要沮喪 時(shí)間: 2025-3-28 05:06
Ahmet Arif Eren,Orhan ?im?ek,Zafer Adal?re diverse in techniques, attack progression, and impacts. System administrators require comprehensive analytics to assess their defense against these diverse adversarial strategies. To address this challenge, this paper proposes a methodology to assess cyber threats proactively by characterizing ad作者: 彈藥 時(shí)間: 2025-3-28 08:21
Elizaveta Ibragimova,Nora Baranyaion of program features contribute to not only growing complexity but also increased the attack surface, making the maintenance of network protocol security very challenging. Existing works try to mitigate program bloat by source-code level static analysis (such as tainting and slicing) or dynamic te作者: 煩躁的女人 時(shí)間: 2025-3-28 11:39 作者: 神圣不可 時(shí)間: 2025-3-28 16:51
Imran Hussain,Swarup Samanta,Ramesh Chandra Dasous attraction traffic, broken network. To deal with this kind of attack, routing verification is introduced by current research. However, it can only detect attacks against a specific routing policy triggered by one malicious node, and no research has yet been conducted to solve the problem caused 作者: 健壯 時(shí)間: 2025-3-28 20:29 作者: 帶來的感覺 時(shí)間: 2025-3-29 01:08
Muhammad Safdar Sial,Konstantin Panasenkoeen an outstanding challenge for emerging smart systems. To mitigate the burden on IoT devices, one prevalent solution is to offload the CNN inference tasks to the public cloud. However, this “offloading-to-cloud” solution may cause privacy breach since the offloaded data can contain sensitive infor作者: construct 時(shí)間: 2025-3-29 07:10
Fatma Ta?demiress variants during propagation by obfuscating part of their executable code automatically, thus posing serious challenges to all existing detection methods. To address this problem, a fundamental task is to understand the stable features that are relatively invariant across all variants of a certai作者: 牢騷 時(shí)間: 2025-3-29 08:26 作者: 語(yǔ)言學(xué) 時(shí)間: 2025-3-29 13:17 作者: 鄙視讀作 時(shí)間: 2025-3-29 17:47 作者: 消音器 時(shí)間: 2025-3-29 22:36
Zaffar Ahmed Shaikh,Nikita Makarichevssance of IP addresses and ports is prerequisite to many host and network attacks. At the same time, knowing IP addresses is required for service reachability in IP networks, which makes complete concealment of IP address for servers infeasible. In addition, changing IP addresses too frequently may 作者: Aphorism 時(shí)間: 2025-3-30 00:33 作者: MANIA 時(shí)間: 2025-3-30 04:17 作者: CHURL 時(shí)間: 2025-3-30 10:15 作者: FUSE 時(shí)間: 2025-3-30 15:32 作者: Pathogen 時(shí)間: 2025-3-30 20:19 作者: 蠟燭 時(shí)間: 2025-3-30 23:30
ICT Trade and Energy Transition in the BRICS Economies, that FDI significantly reduces CO. emissions, but the impact on the use of renewable energy is negligible. Economic growth contrastingly aggravates environmental pollution in the bloc. The findings provide significant policy recommendations for environmental sustainability in the BRICS economies.作者: antedate 時(shí)間: 2025-3-31 02:26 作者: calorie 時(shí)間: 2025-3-31 09:00 作者: evaculate 時(shí)間: 2025-3-31 11:01 作者: Cpr951 時(shí)間: 2025-3-31 14:07
ICT Trade and Energy Transition in the BRICS Economies,e emission in the BRICS bloc over the period 2000–2017. The long-term impact of ICT trade on renewable energy demand and CO. emissions is examined using the dynamic ordinary least squares (DOLS) approach. The findings from the econometric analysis suggest that increasing trade of ICT products promot作者: Adenocarcinoma 時(shí)間: 2025-3-31 19:44
Features of the Emergence and Functioning of the Energy Uncertainty Management in Russia, each State the freedom to choose at the state level. This event was the reason for a new wave of discussions on the key nuances of the formation and creation of a system for guaranteeing financial energy risks in Russia. The Russian Ministry of Finance also mostly opposed energy risk insurance, as 作者: accomplishment 時(shí)間: 2025-4-1 01:38