abysmal 发表于 2025-3-30 09:16:18

http://reply.papertrans.cn/28/2702/270129/270129_51.png

Nucleate 发表于 2025-3-30 13:02:53

An Analysis of Cyber Espionage Processme of cyber espionage process based on a literature review of remarkable cases which generated news about this topic and includes the malware report analysis made by security vendors. To understand the aspects involved and the approaches employed, we defined a general model to cover all phases used

袖章 发表于 2025-3-30 17:54:11

Portuguese Concerns and Impact on Behaviour About Cybersecurity: A Comparison with the European Averty challenges that can have high economic impacts. The growth of Internet use is also leading to a general increase in cybercrime concerns as well as the number of users’ victims of this permanent threat. This reality is also very present in Portugal as well as in other European countries. In this c
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Developments and Advances in Defense and Security; Proceedings of MICRA Álvaro Rocha,Carlos Hernan Fajardo-Toro,José María Conference proce