-
101
A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks
Published 2024-12-01Get full text
Article -
102
-
103
Cross-domain entity identity association analysis and prediction based on representation learning
Published 2022-11-01“…Cross-domain identity association of network entities is a significant research challenge and a vital issue of practical value in relationship discovery and service recommendation between things in the Internet of things, cyberspace resources surveying mapping, threat tracking, and intelligent recommendation. …”
Get full text
Article -
104
Coordinating Manipulation in Real-time Interactive Mechanism of College Admission: Agent-Based Simulations
Published 2020-01-01“…The matching in college admission is a typical example of applying algorithms in cyberspace to improve the efficiency of the corresponding process in physical space. …”
Get full text
Article -
105
Digital Transnational Dissidence and State Control: A Conceptual Reflection on the Practice and Limits of Digital Transnationalism
Published 2023-01-01“…The paper examines how and why cyberspace turns into a domain for transnational political opposition and, in a related way, examines state endeavours to regulate and govern digital areas as a means of overseeing the digital transnationalism of (trans)local and transnational dissidence groups. …”
Get full text
Article -
106
“High energy ahead!”: exploring Chinese adolescents’ pragmatic identities in bullet-screen discourse
Published 2025-02-01“…As active communication participants in cyberspace, the online language features and identity construction characteristics of adolescents not only reflect the value orientations and behavioral patterns of contemporary youth but also play a significant role in the evolution and shaping of online social environments. …”
Get full text
Article -
107
Review of communication optimization methods in federated learning
Published 2024-12-01“…With the development and popularization of artificial intelligence technologies represented by deep learning, the security issues they continuously expose have become a huge challenge affecting cyberspace security. Traditional cloud-centric distributed machine learning, which trains models or optimizes model performance by collecting data from participating parties, is susceptible to security attacks and privacy attacks during the data exchange process, leading to consequences such as a decline in overall system efficiency or the leakage of private data. …”
Get full text
Article -
108
Macro Issues of Urban and Rural Development and Land Use Planning in the Horizon of Iran 1420 with Strategic Future Approach
Published 2025-06-01“…The findings reveal that Iran will likely experience sudden disruptions and heightened uncertainties, compounded by economic, social, political, environmental, demographic, geopolitical, and climate-related factors, as well as issues related to cyberspace and increasing inequalities. Furthermore, there are unanticipated and unaddressed threats on the horizon. …”
Get full text
Article -
109
The Urgency of Cybercrime Law Reform in Indonesia: Resolving Artificial Intelligence Criminal Liability
Published 2024-12-01“…Illegal activities in cyberspace are also increasing, and the diversity of their actions with various skills is constantly increasing.…”
Get full text
Article -
110
Development of the national cybersecurity system of Ukraine as a necessary element of information society development
Published 2021-12-01“…With the emergence of new challenges and threats in cyberspace, there is a need to find new methods and ways to combat cybercrime and cyberterrorism. …”
Get full text
Article -
111
Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data
Published 2025-02-01“…With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). …”
Get full text
Article -
112
Analsisis pemasaran dan keuangan digital terhadap daya saing global hasil pertanian komoditas ekspor di provinsi Sulawesi-Selatan
Published 2024-07-01“…As a result, business actors compete with each other to create interesting content to display in their marketing in cyberspace. Financial technology is one of the factors that supports the increase in agricultural commodities that have global competitiveness. …”
Get full text
Article -
113
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Published 2024-01-01Get full text
Article -
114
Examining Examples and Elements of Illegal Competition and Anti-Competitive Practices with an Emphasis on the Resulting Civil Liability
Published 2024-09-01“…Please ask the court, taking into account new and creative ways of applying anti-competitive procedures and conducting insidious competition, the need for more legal supervision and the establishment of new laws in accordance with the civil responsibility of applying new procedures and illegal competition, especially in cyberspace and according to With the progress of science, it is felt more and more.…”
Get full text
Article -
115
Cooperative evolution with reward-based heterogeneous tax in spatial public goods games
Published 2025-02-01Get full text
Article -
116
An evolution model for the mobility of urban societal classes based on complex networks
Published 2025-01-01“…Like traditional geographical space, in cities, cyberspace and societal space also offer diverse channels for human interactions. …”
Get full text
Article -
117
PILIETINIO NEPAKLUSNUMO IR LIBERALIOS DEMOKRATIJOS SUDERINAMUMO PROBLEMA ŠIUOLAIKINĖJE TEISĖS FILOSOFIJOJE
Published 2002-01-01“…Toreau till current attempts to use the cyberspace for the acts of civil disobedience. Secondly, the analytical problem how to define the concept of "civil disobedience" is scrutinized, paying special attention to differences between the acts of civil disobedience and those of evasion and conscientious refusal. …”
Get full text
Article -
118
-
119
Designing a cyber insurance implementation model using foundational data theory
Published 2024-05-01“…Theoretical framework Insurance in cyberspace or cyber insurance is an insurance policy that is provided by insurers through creating market incentives and with the aim of improving the internet security environment. …”
Get full text
Article -
120
From Dickens’s Theatrical Performance to Contemporary post Dickensian Narrative and Artistic Performance (Acker, Ackroyd, Waters and Rushdie)
Published 2010-06-01“…With English Music, Ackroyd, for his part, illustrates what Clayton in his study: Charles Dickens in Cyberspace (2003) calls “undisciplined” creativity, by revisiting Great Expectations trans-artistically, through an odd combination of the pictorial, the musical, the cinematographic and the theatrical. …”
Get full text
Article