podiatrist 发表于 2025-3-23 12:26:22

http://reply.papertrans.cn/47/4651/465047/465047_11.png

ALE 发表于 2025-3-23 14:24:25

Digital Forensics: Implementation and Analysis for Google Android Framework,. These include typical Android device information such as SMS, browser history and searches, call log data, and device accounts. This proposed research focuses on the implementation, analysis, and performance of Google Android mobile forensic software and results of the finding. We have presented o

Nostalgia 发表于 2025-3-23 18:07:17

1860-949X wledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers..978-3-319-83023-0978-3-319-44257-0Series ISSN 1860-949X Series E-ISSN 1860-9503

食草 发表于 2025-3-23 22:17:21

Book 2017curacy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers..

CONE 发表于 2025-3-24 03:14:44

http://reply.papertrans.cn/47/4651/465047/465047_15.png

范围广 发表于 2025-3-24 07:38:06

http://reply.papertrans.cn/47/4651/465047/465047_16.png

DIS 发表于 2025-3-24 13:36:27

Ahmed AlEroud,George Karabatisental power and scope in related affairs as well as cultural differences and value diversity, which make the monitoring and auditing of CSR initiatives within a company or country challenging. The chapter concludes that a normative issue regarding the monitoring process can arise as businesses are m

灌溉 发表于 2025-3-24 17:14:12

Ahmed AlEroud,George Karabatistructures are entwined (being connected to the social and tribal systems), the GCC governments can influence the business community only through persuasion, not legislation. Therefore, it is unlikely that the character and extent of CSR in the GCC countries will change any time soon.

Tortuous 发表于 2025-3-24 19:47:14

http://reply.papertrans.cn/47/4651/465047/465047_19.png

defile 发表于 2025-3-24 23:54:51

Mohamed Abdlhamed,Kashif Kifayat,Qi Shi,William Hursttehen. Zum einen sind im globalen Rahmen die Maßstäbe für richtiges Verhalten unklarer als innerhalb der Grenzen von Nationalstaaten. Deren rechtliche Regelungen, so sehr sie von Unternehmensseite häufig kritisiert werden, sorgen für Orientierung und gleiche Ausgangsbedingungen zwischen Konkurrenten
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Information Fusion for Cyber-Security Analytics; Izzat M Alsmadi,George Karabatis,Ahmed Aleroud Book 2017 Springer International Publishin