在前面 发表于 2025-3-25 06:39:15

Shyness and Sociability Revisited to communicate anonymously without revealing identifying information. Keeping Internet activity anonymous and private can be beneficial for both legal and illegal applications. Although it is used to evade government censorship, it is also deployed for highly illegal activity. The aim of this paper

Scleroderma 发表于 2025-3-25 08:27:00

http://reply.papertrans.cn/25/2420/241929/241929_22.png

龙卷风 发表于 2025-3-25 11:55:31

http://reply.papertrans.cn/25/2420/241929/241929_23.png

即席演说 发表于 2025-3-25 16:43:07

Cybersecurity in the Age of Smart Societies978-3-031-20160-8Series ISSN 1613-5113 Series E-ISSN 2363-9466

Introduction 发表于 2025-3-25 21:17:13

Security Risk Management and Cybersecurity: From the Victim or from the Adversary?,ally point to ISO 31000 risk management. This key exercise to ensure the “known” risks is carried out in a reactive perspective, since not only the risks are known and treated, but also the organization is prepared when one of them materializes. Thus, it is necessary to advance in cyber risk managem

Pessary 发表于 2025-3-26 02:28:06

Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture,n for the validation of parameters. The methodology known as ENISA was used to filter, select and adjust to the needs of the architecture carried out in this project and was compared with the Hardening methodology. To review and validate the parameters of each one, a test bed environment was designe

眨眼 发表于 2025-3-26 05:54:44

A Critical Review into the Digital Transformation of Land Title Management: The Case of Mining in Z of negotiating fair value when pursuing profit while at the same time attempting to balance equality and sustainability of the sector. While the mining sector is of significant value to the economy, there are challenges in managing land administration. This research aims to provide a strategic temp

数量 发表于 2025-3-26 08:53:19

Harnessing Big Data for Business Innovation and Effective Business Decision Making,tition and technological advancement. Large corporations have the resources to invest in an expensive Big Data and Analytics infrastructure or platform, however, using business intelligence technologies is a challenging effort for start-ups owing to hefty license costs, the need to create an integra

小画像 发表于 2025-3-26 12:37:09

Building a Resilient Cybersecurity Workforce: A Multidisciplinary Solution to the Problem of High Tandemic and the recent global widespread of cybersecurity breaches. The gaps in security operations, due to inconsistency in the availability of cyber security workforce exposes the organisation to the possibility of costly security breaches. Although there are diverse views on the factors responsib

比赛用背带 发表于 2025-3-26 18:01:26

http://reply.papertrans.cn/25/2420/241929/241929_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Cybersecurity in the Age of Smart Societies; Proceedings of the 1 Hamid Jahankhani Conference proceedings 2023 The Editor(s) (if applicable