Enrage 发表于 2025-3-28 16:48:27

http://reply.papertrans.cn/25/2420/241929/241929_41.png

宽宏大量 发表于 2025-3-28 20:21:38

Cyber Security Compliance Among Remote Workers,rganizational development. This study seeks to find out how remote employees comply with their organizations’ cybersecurity regulations and policies. The objectives of this research are to investigate strategies organizations use to keep positive cyber security compliance, understand the challenges

昏迷状态 发表于 2025-3-29 00:43:58

http://reply.papertrans.cn/25/2420/241929/241929_43.png

CEDE 发表于 2025-3-29 06:50:34

http://reply.papertrans.cn/25/2420/241929/241929_44.png

营养 发表于 2025-3-29 10:36:57

http://reply.papertrans.cn/25/2420/241929/241929_45.png

paradigm 发表于 2025-3-29 14:44:03

A Critical Review into the Digital Transformation of Land Title Management: The Case of Mining in Zresearch for Zimbabwe. Therefore, this research investigates how digital transformation can support mining land title management to create transparency and accountability. From a myriad of available options, this research proposes a technological solution based on Blockchain’s Self-Sovereign Identit

整顿 发表于 2025-3-29 17:03:29

http://reply.papertrans.cn/25/2420/241929/241929_47.png

仔细检查 发表于 2025-3-29 21:34:18

Building a Resilient Cybersecurity Workforce: A Multidisciplinary Solution to the Problem of High Tand cybersecurity leaders, including the views of experts from the fields of Human Resources (HR) and psychology. This research was conducted as a case study of the two types of Security Operations Centres (SOCs): in-house and Managed Security Service Providers (MSSP), between the months of March an

monochromatic 发表于 2025-3-30 00:27:29

http://reply.papertrans.cn/25/2420/241929/241929_49.png

TRUST 发表于 2025-3-30 07:46:49

IoT-Penn: A Security Penetration Tester for MQTT in the IoT Environment,This paper intended to answer the question of the utility of penetration testing when designing and evaluating an MQTT network. Various attacks were catalogued, designed, and implemented in an application called IoTPenn. These attacks were carried out on a simulated MQTT network, after which the res
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Cybersecurity in the Age of Smart Societies; Proceedings of the 1 Hamid Jahankhani Conference proceedings 2023 The Editor(s) (if applicable