Results 11 to 20 of about 56,667 (320)
Risk and uncertainty can be analyzed in cyberspace
Perceptions of risk and uncertainty are pervasive in all international interactions. How states perceive risk and uncertainty and how they respond to these conditions impacts their policies and diplomatic behaviors.
Aaron F. Brantly
semanticscholar +1 more source
Introduction to cyberspace security discipline
With rapidly development of electronic information technology and industry, human society comes into information age. In the information age human lives and works in cyberspace.
ZHANG Huanguo, DU Ruiying
doaj +3 more sources
Knowledge Graph Based Approach to Cyberspace Geographic Mapping Construction [PDF]
In the digital information era of rapid development of the Internet and increasing importance of cybersecurity,cyberspace geographic mapping is regarded as a new type of means of cognition and management of cyberspace.By synthesizing the information of ...
WU Yue, HU Wei, LI Chenglong, YANG Jiahai, LI Zhiqi, YIN Qin, XIA Ang, DANG Fangfang
doaj +1 more source
Cryptographic cores are the key components to enforce information security properties related to confidentiality and integrity. Since the security of a cryptographic core implementation and the security of the cryptographic algorithm itself from the ...
MA Yixin +4 more
doaj +1 more source
Robust steganography in practical communication: a comparative study
To realize the act of covert communication in a public channel, steganography is proposed. In the current study, modern adaptive steganography plays a dominant role due to its high undetectability.
Tong Qiao +7 more
doaj +1 more source
Voluntary Vaccination through Self-organizing Behaviors on Locally-mixed Social Networks
Voluntary vaccination reflects how individuals weigh the risk of infection and the cost of vaccination against the spread of vaccine-preventable diseases, such as smallpox and measles.
Benyun Shi +5 more
doaj +1 more source
Research on cyberspace security situation awareness
Cyberspace is the fifth sovereignty space after the sea,land,sky and space.The security of cyberspace is closely relative to national security.How to discover threat in time,how to defense network attack,how to trace attackers were the problems to be ...
Gan-sen ZHAO,Jie-chao WU,Zi-hao CHEN,Xue-qi REN,Hao-xiang TAN +1 more
doaj +3 more sources
A Many-Objective Evolutionary Algorithm Based on Indicator and Decomposition
In the field of many-objective evolutionary optimization algorithms (MaOEAs), how to maintain the balance between convergence and diversity has been a significant research problem.
Yizhang Xia +5 more
doaj +1 more source
Power and diplomacy in the post-liberal cyberspace
It is becoming widely accepted that we have transitioned, or are now transitioning, from an international liberal order to a different reality.
A. Barrinha, Thomas. Renard
semanticscholar +1 more source
Phishing Node Detection in Ethereum Transaction Network Using Graph Convolutional Networks
As the use of digital currencies, such as cryptocurrencies, increases in popularity, phishing scams and other cybercriminal activities on blockchain platforms (e.g., Ethereum) have also risen.
Zhen Zhang +5 more
doaj +1 more source

