相似 发表于 2025-3-21 16:16:52

书目名称E-business and Telecommunications影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0300193<br><br>        <br><br>书目名称E-business and Telecommunications影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0300193<br><br>        <br><br>书目名称E-business and Telecommunications网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0300193<br><br>        <br><br>书目名称E-business and Telecommunications网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0300193<br><br>        <br><br>书目名称E-business and Telecommunications被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0300193<br><br>        <br><br>书目名称E-business and Telecommunications被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0300193<br><br>        <br><br>书目名称E-business and Telecommunications年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0300193<br><br>        <br><br>书目名称E-business and Telecommunications年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0300193<br><br>        <br><br>书目名称E-business and Telecommunications读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0300193<br><br>        <br><br>书目名称E-business and Telecommunications读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0300193<br><br>        <br><br>

幻影 发表于 2025-3-21 22:03:09

http://reply.papertrans.cn/31/3002/300193/300193_2.png

OREX 发表于 2025-3-22 03:14:04

Bidding Agents That Perpetrate Auction Fraudo as shill bidding. Shill bidding is strictly prohibited by online auctioneers, as it defrauds unsuspecting buyers by forcing them to pay more for the item. The malicious bidding agent was constructed to aid in developing shill detection techniques. We have previously documented a simple shill biddi

electrolyte 发表于 2025-3-22 06:41:43

A Platform for Mobile Service Provisioning Based on SOA-Integration has to offer a variety of different features. Some of these features have to be provided by external parties, e.g. billing or content syndication. The integration of all these features while considering mobile-specific challenges is a demanding task. In the article at hand we thus describe a middle

确认 发表于 2025-3-22 11:59:08

http://reply.papertrans.cn/31/3002/300193/300193_5.png

Sedative 发表于 2025-3-22 16:10:25

http://reply.papertrans.cn/31/3002/300193/300193_6.png

Sedative 发表于 2025-3-22 19:48:26

An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains of the existing rule-based fraud detection systems consist of fixed and inflexible decision-making rules which limit significantly the effectiveness of such systems. In this paper we present a fraud detection approach which combines the technologies of knowledge-based systems and adaptive systems i

artless 发表于 2025-3-22 23:26:12

Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model prevent such scanning malware from spreading within an enterprise network. It is especially important to suppress scanning malware infection to less than a few infected hosts. We estimated the timing of containment software to block “scanning malware” in a homogeneous enterprise network. The “combi

Exhilarate 发表于 2025-3-23 04:57:37

http://reply.papertrans.cn/31/3002/300193/300193_9.png

Cougar 发表于 2025-3-23 07:19:58

http://reply.papertrans.cn/31/3002/300193/300193_10.png
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: E-business and Telecommunications; 4th International Co Joaquim Filipe,Mohammad S. Obaidat Conference proceedings 2009 Springer-Verlag Berl