诱使 发表于 2025-3-28 18:11:03

http://reply.papertrans.cn/28/2799/279849/279849_41.png

植物群 发表于 2025-3-28 19:15:21

An Empirical Evaluation of Cyber Threat Intelligence Sharing in the ECHO Early Warning Systemtency centres participated in the form of CSIRTs employed the ECHO Early Warning System. Through a structured tabletop exercise, over 10 CSIRTS were engaged and a number of features were captured and monitored. A key research question was to determine the factors that can potentially hinder or ampli

CROW 发表于 2025-3-29 01:28:15

Approaching Cyber Situational Awareness Through Digital Services Availability Monitoring and Threatinternational scale. Additionally, in recent years, and particularly as the online operations of many sectors of daily life have become increasingly interdependent, the need to safeguard individual services to protect entire economic sectors has become increasingly apparent. Intrusion detection and

泥沼 发表于 2025-3-29 06:20:22

http://reply.papertrans.cn/28/2799/279849/279849_44.png

似少年 发表于 2025-3-29 09:00:31

http://reply.papertrans.cn/28/2799/279849/279849_45.png

amygdala 发表于 2025-3-29 13:21:49

http://reply.papertrans.cn/28/2799/279849/279849_46.png

Asseverate 发表于 2025-3-29 16:11:06

Cybersecurity in Donated Distributed Computing for Evolutionary Algorithmsting resources. Donated calculating power can involve thousands of separate CPUs and it can achieve the performance of a supercomputer. In most of the cases donated distributed computing is organized by open source software, which can lead to the involvement of many more volunteers. This research fo

indignant 发表于 2025-3-29 20:47:43

Modelling a Multi-agent Protection System of an Enterprise Network will ensure mobility, adaptability and fault tolerance of a multi-agent protection system (MAS). The analysis of classes of MAS agents by their functionality is conducted. The integration of MAS in corporate networks is based on the distribution of corporate network components between agents which

OPINE 发表于 2025-3-30 03:58:41

Analysis of Workability of One-Way Functions Based on Cellular Automata in Diffie–Hellman Algorithm yption keys for transmitting Big Data in conditions of information exchange via open communication channels. The authors improve the Diffie-Hellman algorithm by using a new type of one-way functions - cellular automats. The used automats have extended rules in the direction of determining the laws o

milligram 发表于 2025-3-30 07:32:20

http://reply.papertrans.cn/28/2799/279849/279849_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Digital Transformation, Cyber Security and Resilience; Second International Todor Tagarev,Nikolai Stoianov Conference proceedings 2024 The