Agility 发表于 2025-3-25 03:33:39

Shahram LatifiFeatures the most recent advances in information technology;.Presents early work and novel results from research laboratories around the world;.Facilitates managers making business decisions, academic

Irrepressible 发表于 2025-3-25 09:17:16

Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/465650.jpg

CHART 发表于 2025-3-25 13:28:05

http://reply.papertrans.cn/47/4657/465650/465650_23.png

PLE 发表于 2025-3-25 16:21:32

Safeguarding Personal Health Information: Case Studyine weak passwords within our own infrastructure. In using products, such as, Cain and Abel or Ophcrack, organizations can gain insight and awareness that could be the stronghold in keeping accounts and personal health information (PHI) safe. Cain and Abel, and Ophcrack, which are the two password c

遭受 发表于 2025-3-25 21:24:01

Performance Study of the Impact of Security on 802.11ac Networkshem more vulnerable to security breaches compared to wired networks. IEEE 802.11ac specification is currently the widely used WLAN standard deployed by most organizations..We study the impact of security on 802.11AC WLANs using different security modes (No Security, Personal and Enterprise Security)

闲逛 发表于 2025-3-26 00:50:57

http://reply.papertrans.cn/47/4657/465650/465650_26.png

尽管 发表于 2025-3-26 08:06:50

http://reply.papertrans.cn/47/4657/465650/465650_27.png

Innovative 发表于 2025-3-26 10:53:22

The Modern State and the Further Development Prospects of Information Security in the Republic of Ka new vulnerabilities and security concerns for entire states. The article is devoted to the analysis of the modern state of information security in the Republic of Kazakhstan. This article reviews the law, standards, technologies and incidents in the field of information security. Some statistics of

Anthem 发表于 2025-3-26 13:45:59

Evaluating Cyber Threats to the United Kingdom’s National Health Service (NHS) Spine Networkty threats that could lead to potential breaches of personal health information hosted on the network. Specifically, the document will address details of the NHS Spine infrastructure and how its components, users, and security mechanisms have a great impact on the NHS’ overall ability to provide qua

GRIPE 发表于 2025-3-26 17:04:17

A Virtual Animated Commentator Architecture for Cybersecurity Competitionsces because audiences may not be experts in the field. To improve the audiences’ comprehension and engagement levels at these events, we have proposed a virtual commentator architecture for cybersecurity competitions. Based on the architecture, we have developed a virtual animated agent that serves
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Technology - New Generations; 15th International C Shahram Latifi Conference proceedings 2018 Springer International Publishing