carbohydrate 发表于 2025-3-28 15:53:52

Can Blockchain Technology Be a Solution for Safety in No-Trust Environments?,hain mechanisms, the aim of the paper is not to persuade everyone to become a member of a blockchain, but to call attention to the opportunities offered by such networks and emphasize, that neither of the introduced mechanisms are without flaws.

arcane 发表于 2025-3-28 22:46:55

http://reply.papertrans.cn/87/8637/863664/863664_42.png

抱怨 发表于 2025-3-29 02:29:24

Need for Cybersecurity Solutions in IoT Systems,with basic level of ICT skills can become a potential attacker or hacker. The goal of this article is to highlight the importance of protecting the IoT system, because by controlling even some simply process, the hackers can cause considerable damage.

Processes 发表于 2025-3-29 05:38:43

Critical Threat of Critical Infrastructures: The Human Factor,ety and security issues, has changed radically in the past decades owing to the rapid development of the applied technologies. Though processes are speeding up and the machinery is improving at a rapid pace the human factor seems to be the weakest link. Hence, present paper endeavours to address thi

短程旅游 发表于 2025-3-29 10:58:46

Applications of Hopkinson Bar Technique for Capability Testing of High-Energy Absorption Materials,ts of critical infrastructures. The possibility of testing samples of various materials (granular, cellular and polymer materials) based on Hopkinson bar technology in various configurations of the sample and measuring bars settings was discussed. An example of a split Hopkinson pressure bar test st

庇护 发表于 2025-3-29 12:39:17

A Method for Approximating Circular Error Probable, paper considers the method for estimating circular error probable, which is based on simulation and uses stochastic approximation. The proposed method differs from other similar methods since it is based on the coordinate transformation of the ballistic projectile impact to use the quotient of stan

细丝 发表于 2025-3-29 16:52:53

Machine Learning Aspects of Internet Firewall Data, a suitable dataset containing standard traffic attributes as well as the ability of Weka software package for modeling and testing multilayer perceptrons (MLP) was used. The aim of this paper was to create and examine an NN model of Internet firewall and optimize its parameters that best simulates

AGGER 发表于 2025-3-29 21:21:34

,The End of Encryption? – The Era of Quantum Computers,ple work, communicate, and live online. For this reason, information security is more important than ever. However, the awareness regarding ICT related security threats have not increased significantly in the past decades. In present paper we introduce the traditional identification methodologies fo

易于出错 发表于 2025-3-30 03:20:49

http://reply.papertrans.cn/87/8637/863664/863664_49.png

bile648 发表于 2025-3-30 06:42:38

http://reply.papertrans.cn/87/8637/863664/863664_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Security-Related Advanced Technologies in Critical Infrastructure Protection; Theoretical and Prac Tünde Anna Kovács,Zoltán Nyikes,Igor Für