Showing 101 - 120 results of 131 for search '"cyberspace"', query time: 0.06s Refine Results
  1. 101
  2. 102
  3. 103

    Cross-domain entity identity association analysis and prediction based on representation learning by Mingcheng Gao, Ruiheng Wang, Lu Wang, Yang Xin, Hongliang Zhu

    Published 2022-11-01
    “…Cross-domain identity association of network entities is a significant research challenge and a vital issue of practical value in relationship discovery and service recommendation between things in the Internet of things, cyberspace resources surveying mapping, threat tracking, and intelligent recommendation. …”
    Get full text
    Article
  4. 104

    Coordinating Manipulation in Real-time Interactive Mechanism of College Admission: Agent-Based Simulations by Lan Hou, Tao Jia, Xiangbing Wang, Tongkui Yu

    Published 2020-01-01
    “…The matching in college admission is a typical example of applying algorithms in cyberspace to improve the efficiency of the corresponding process in physical space. …”
    Get full text
    Article
  5. 105

    Digital Transnational Dissidence and State Control: A Conceptual Reflection on the Practice and Limits of Digital Transnationalism by Hüsrev Tabak, Cenk Beyaz

    Published 2023-01-01
    “…The paper examines how and why cyberspace turns into a domain for transnational political opposition and, in a related way, examines state endeavours to regulate and govern digital areas as a means of overseeing the digital transnationalism of (trans)local and transnational dissidence groups. …”
    Get full text
    Article
  6. 106

    “High energy ahead!”: exploring Chinese adolescents’ pragmatic identities in bullet-screen discourse by Jue Wu

    Published 2025-02-01
    “…As active communication participants in cyberspace, the online language features and identity construction characteristics of adolescents not only reflect the value orientations and behavioral patterns of contemporary youth but also play a significant role in the evolution and shaping of online social environments. …”
    Get full text
    Article
  7. 107

    Review of communication optimization methods in federated learning by YANG Zhikai, LIU Yaping, ZHANG Shuo, SUN Zhe, YAN Dingyu

    Published 2024-12-01
    “…With the development and popularization of artificial intelligence technologies represented by deep learning, the security issues they continuously expose have become a huge challenge affecting cyberspace security. Traditional cloud-centric distributed machine learning, which trains models or optimizes model performance by collecting data from participating parties, is susceptible to security attacks and privacy attacks during the data exchange process, leading to consequences such as a decline in overall system efficiency or the leakage of private data. …”
    Get full text
    Article
  8. 108

    Macro Issues of Urban and Rural Development and Land Use Planning in the Horizon of Iran 1420 with Strategic Future Approach by Aliakbar Jafarloo, Monireh Ghofran, Sahar Nazari

    Published 2025-06-01
    “…The findings reveal that Iran will likely experience sudden disruptions and heightened uncertainties, compounded by economic, social, political, environmental, demographic, geopolitical, and climate-related factors, as well as issues related to cyberspace and increasing inequalities. Furthermore, there are unanticipated and unaddressed threats on the horizon. …”
    Get full text
    Article
  9. 109

    The Urgency of Cybercrime Law Reform in Indonesia: Resolving Artificial Intelligence Criminal Liability by Kurnia Dewi Anggraeny, Mufti Khakim, Muhammad Rizal Sirojudin

    Published 2024-12-01
    “…Illegal activities in cyberspace are also increasing, and the diversity of their actions with various skills is constantly increasing.…”
    Get full text
    Article
  10. 110

    Development of the national cybersecurity system of Ukraine as a necessary element of information society development by S. H. Petrov

    Published 2021-12-01
    “…With the emergence of new challenges and threats in cyberspace, there is a need to find new methods and ways to combat cybercrime and cyberterrorism. …”
    Get full text
    Article
  11. 111

    Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data by Abhishek Sharma, May Bantan

    Published 2025-02-01
    “…With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). …”
    Get full text
    Article
  12. 112

    Analsisis pemasaran dan keuangan digital terhadap daya saing global hasil pertanian komoditas ekspor di provinsi Sulawesi-Selatan by Muhammad Irfan Arya, Farhan Djufri, Hartina Beddu

    Published 2024-07-01
    “…As a result, business actors compete with each other to create interesting content to display in their marketing in cyberspace. Financial technology is one of the factors that supports the increase in agricultural commodities that have global competitiveness. …”
    Get full text
    Article
  13. 113
  14. 114

    Examining Examples and Elements of Illegal Competition and Anti-Competitive Practices with an Emphasis on the Resulting Civil Liability by Leila Ghaemi, Hossein Ghorbanian, Alireza Hasani

    Published 2024-09-01
    “…Please ask the court, taking into account new and creative ways of applying anti-competitive procedures and conducting insidious competition, the need for more legal supervision and the establishment of new laws in accordance with the civil responsibility of applying new procedures and illegal competition, especially in cyberspace and according to With the progress of science, it is felt more and more.…”
    Get full text
    Article
  15. 115
  16. 116

    An evolution model for the mobility of urban societal classes based on complex networks by Yi-Hua Zhou, Liang-Li Yang, Jieqi Lei, Rui-Jie Wu, Yi-Xiu Kong

    Published 2025-01-01
    “…Like traditional geographical space, in cities, cyberspace and societal space also offer diverse channels for human interactions. …”
    Get full text
    Article
  17. 117

    PILIETINIO NEPAKLUSNUMO IR LIBERALIOS DEMOKRATIJOS SUDERINAMUMO PROBLEMA ŠIUOLAIKINĖJE TEISĖS FILOSOFIJOJE by Jūratė Černevičiūtė

    Published 2002-01-01
    “…Toreau till current attempts to use the cyberspace for the acts of civil disobedience. Secondly, the analytical problem how to define the concept of "civil disobedience" is scrutinized, paying special attention to differences between the acts of civil disobedience and those of evasion and conscientious refusal. …”
    Get full text
    Article
  18. 118
  19. 119

    Designing a cyber insurance implementation model using foundational data theory by Behzad Esmaeilifar, manouchehr Ansari

    Published 2024-05-01
    “…Theoretical framework Insurance in cyberspace or cyber insurance is an insurance policy that is provided by insurers through creating market incentives and with the aim of improving the internet security environment. …”
    Get full text
    Article
  20. 120

    From Dickens’s Theatrical Performance to Contemporary post Dickensian Narrative and Artistic Performance (Acker, Ackroyd, Waters and Rushdie) by Georges Letissier

    Published 2010-06-01
    “…With English Music, Ackroyd, for his part, illustrates what Clayton in his study: Charles Dickens in Cyberspace (2003) calls “undisciplined” creativity, by revisiting Great Expectations trans-artistically, through an odd combination of the pictorial, the musical, the cinematographic and the theatrical. …”
    Get full text
    Article