This study delves into micro-mobility in Indonesia, focusing on legal, safety, and policy aspects of electric scooters, bicycles, and similar devices. The absence of specific regulations and safety concerns pose chall...
详细信息
The importance of social media, such as Twitter and Instagram, has increased as a result of COVID-19: with social media, users can easily communicate with other people. Accordingly, social media have produced both new...
详细信息
The spread of Covid-19 virus occurs quickly, one of which is through sneezing and coughing (drops or saliva). This becomes an infectious material for dentists in carrying out dental care during the pandemic. Extra-ora...
详细信息
Quantum computing is progressing at a fast rate and there is a real threat that classical cryptographic methods can be compromised and therefore impact the security of blockchain networks. All of the ways used to secu...
详细信息
The scheduling community has long been interested in educational timetabling. Particularly in academia, since timetabling dictates the day to day operation of Universities, great effort has been exercised to produce h...
详细信息
In this paper, we evaluate the performance of a Vehicular Ad Hoc Network (VANET) exploiting the M/M/c and the M(N)/M/c queueing models in order to determine the number of the resources that are required to satisfy the...
详细信息
The maritime sector is an industry that faces significant and various challenges related to cyber security and data management, such as fraud and user authentication. Therefore, there is a need for a secure solution t...
详细信息
The cybersecurity industry faces a significant skills gap, with a shortage of qualified professionals to meet the growing demand for cyber talent. Although there is a wide variety of cybersecurity professional trainin...
详细信息
ISBN:
(数字)9798331539498
ISBN:
(纸本)9798331539504
The cybersecurity industry faces a significant skills gap, with a shortage of qualified professionals to meet the growing demand for cyber talent. Although there is a wide variety of cybersecurity professional trainings available, these trainings use different approaches and the certificates obtained are not compatible with each other. Contrary to the United States, there is no European Authority responsible for approving these trainings. The situation becomes even more complex when considering sector-specific trainings. This paper sheds light on the certification landscape regarding relevant, organisations and bodies at the international and European level. The standards, the criteria, and the processes regarding professional certifications are discussed. The manuscript concludes with a proposal of a sector-agnostic schema for a cybersecurity professional training programme.
In this paper, we present a comprehensive completion theory applicable to all quasi-uniform spaces, denoted as Λ-completion. An integral aspect of this completion theory lies in its incorporation of prerequisites art...
详细信息
暂无评论