Enrage 发表于 2025-3-28 16:48:27
http://reply.papertrans.cn/25/2420/241929/241929_41.png宽宏大量 发表于 2025-3-28 20:21:38
Cyber Security Compliance Among Remote Workers,rganizational development. This study seeks to find out how remote employees comply with their organizations’ cybersecurity regulations and policies. The objectives of this research are to investigate strategies organizations use to keep positive cyber security compliance, understand the challenges昏迷状态 发表于 2025-3-29 00:43:58
http://reply.papertrans.cn/25/2420/241929/241929_43.pngCEDE 发表于 2025-3-29 06:50:34
http://reply.papertrans.cn/25/2420/241929/241929_44.png营养 发表于 2025-3-29 10:36:57
http://reply.papertrans.cn/25/2420/241929/241929_45.pngparadigm 发表于 2025-3-29 14:44:03
A Critical Review into the Digital Transformation of Land Title Management: The Case of Mining in Zresearch for Zimbabwe. Therefore, this research investigates how digital transformation can support mining land title management to create transparency and accountability. From a myriad of available options, this research proposes a technological solution based on Blockchain’s Self-Sovereign Identit整顿 发表于 2025-3-29 17:03:29
http://reply.papertrans.cn/25/2420/241929/241929_47.png仔细检查 发表于 2025-3-29 21:34:18
Building a Resilient Cybersecurity Workforce: A Multidisciplinary Solution to the Problem of High Tand cybersecurity leaders, including the views of experts from the fields of Human Resources (HR) and psychology. This research was conducted as a case study of the two types of Security Operations Centres (SOCs): in-house and Managed Security Service Providers (MSSP), between the months of March anmonochromatic 发表于 2025-3-30 00:27:29
http://reply.papertrans.cn/25/2420/241929/241929_49.pngTRUST 发表于 2025-3-30 07:46:49
IoT-Penn: A Security Penetration Tester for MQTT in the IoT Environment,This paper intended to answer the question of the utility of penetration testing when designing and evaluating an MQTT network. Various attacks were catalogued, designed, and implemented in an application called IoTPenn. These attacks were carried out on a simulated MQTT network, after which the res