Results 11 to 20 of about 56,667 (320)

Risk and uncertainty can be analyzed in cyberspace

open access: yesJournal of Cybersecurity, 2021
Perceptions of risk and uncertainty are pervasive in all international interactions. How states perceive risk and uncertainty and how they respond to these conditions impacts their policies and diplomatic behaviors.
Aaron F. Brantly
semanticscholar   +1 more source

Introduction to cyberspace security discipline

open access: yes网络与信息安全学报, 2019
With rapidly development of electronic information technology and industry, human society comes into information age. In the information age human lives and works in cyberspace.
ZHANG Huanguo, DU Ruiying
doaj   +3 more sources

Knowledge Graph Based Approach to Cyberspace Geographic Mapping Construction [PDF]

open access: yesJisuanji kexue
In the digital information era of rapid development of the Internet and increasing importance of cybersecurity,cyberspace geographic mapping is regarded as a new type of means of cognition and management of cyberspace.By synthesizing the information of ...
WU Yue, HU Wei, LI Chenglong, YANG Jiahai, LI Zhiqi, YIN Qin, XIA Ang, DANG Fangfang
doaj   +1 more source

Cryptographic core design security verification and vulnerability detection based on information flow analysis

open access: yesXibei Gongye Daxue Xuebao, 2022
Cryptographic cores are the key components to enforce information security properties related to confidentiality and integrity. Since the security of a cryptographic core implementation and the security of the cryptographic algorithm itself from the ...
MA Yixin   +4 more
doaj   +1 more source

Robust steganography in practical communication: a comparative study

open access: yesEURASIP Journal on Image and Video Processing, 2023
To realize the act of covert communication in a public channel, steganography is proposed. In the current study, modern adaptive steganography plays a dominant role due to its high undetectability.
Tong Qiao   +7 more
doaj   +1 more source

Voluntary Vaccination through Self-organizing Behaviors on Locally-mixed Social Networks

open access: yesScientific Reports, 2017
Voluntary vaccination reflects how individuals weigh the risk of infection and the cost of vaccination against the spread of vaccine-preventable diseases, such as smallpox and measles.
Benyun Shi   +5 more
doaj   +1 more source

Research on cyberspace security situation awareness

open access: yes网络与信息安全学报, 2016
Cyberspace is the fifth sovereignty space after the sea,land,sky and space.The security of cyberspace is closely relative to national security.How to discover threat in time,how to defense network attack,how to trace attackers were the problems to be ...
Gan-sen ZHAO,Jie-chao WU,Zi-hao CHEN,Xue-qi REN,Hao-xiang TAN   +1 more
doaj   +3 more sources

A Many-Objective Evolutionary Algorithm Based on Indicator and Decomposition

open access: yesMathematics, 2023
In the field of many-objective evolutionary optimization algorithms (MaOEAs), how to maintain the balance between convergence and diversity has been a significant research problem.
Yizhang Xia   +5 more
doaj   +1 more source

Power and diplomacy in the post-liberal cyberspace

open access: yesInternational Affairs, 2020
It is becoming widely accepted that we have transitioned, or are now transitioning, from an international liberal order to a different reality.
A. Barrinha, Thomas. Renard
semanticscholar   +1 more source

Phishing Node Detection in Ethereum Transaction Network Using Graph Convolutional Networks

open access: yesApplied Sciences, 2023
As the use of digital currencies, such as cryptocurrencies, increases in popularity, phishing scams and other cybercriminal activities on blockchain platforms (e.g., Ethereum) have also risen.
Zhen Zhang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy