Results 11 to 20 of about 165,246 (172)
Presenting an ontology model of Cyberspace sovereignty: In order to provide a comprehensive definition [PDF]
Also, considering the increasing need of people for virtual space, the governance of the site space has become an important part of the governance of the national real space. Therefore, the existence of sovereignty in cyber space is important. Therefore,
hatef rasouli +2 more
doaj +1 more source
Cyberspace Security Models and Systematic Development from Multiple Perspectives
As cyberspace technologies advance rapidly, cyberspace security risks derived from new applications and technologies are becoming more complex and hidden.
Sun Shuai +5 more
doaj +1 more source
Carbohydrates in Cyberspace [PDF]
1 Monash Institute of Pharmaceutical Sciences, Monash University, Parkville, VIC, Australia, 2 Centre for Biomedical Research, Burnet Institute, Melbourne, VIC, Australia, 3 Department of Immunology, Alfred Medical Research and Education Precinct, Monash University, Melbourne, VIC, Australia, 4 Department of Surgery Austin Health, University of ...
Yuriev, E., Ramsland, Paul
openaire +5 more sources
SHELF: Combination of Shape Fitting and Heatmap Regression for Landmark Detection in Human Face
Today, facial emotion recognition is widely adopted in many intelligent applications including the driver monitoring system, the smart customer care as well as the e-learning system.
Ngo Thi Ngoc Quyen +3 more
doaj +1 more source
Research on the Cyberspace Map and Its Conceptual Model
The cyberspace map, as one of the important tools for describing cyberspace, provides a visual representation of the dynamic and elusive nature of cyberspace. It has become a research hotspot in multiple disciplinary fields.
Lan Zhang +6 more
doaj +1 more source
Challenges and Countermeasures of China's Cyberspace Governance in the New Era [PDF]
In the context of the new era, countries are constantly competing and cooperating in the field of cyberspace. China is facing an increasingly complex international environment.
Zhao Fengyun, Shi Yaning, Yao Ke
doaj +1 more source
Introduction to cyberspace security discipline
With rapidly development of electronic information technology and industry, human society comes into information age. In the information age human lives and works in cyberspace.
ZHANG Huanguo, DU Ruiying
doaj +3 more sources
Knowledge Graph Based Approach to Cyberspace Geographic Mapping Construction [PDF]
In the digital information era of rapid development of the Internet and increasing importance of cybersecurity,cyberspace geographic mapping is regarded as a new type of means of cognition and management of cyberspace.By synthesizing the information of ...
WU Yue, HU Wei, LI Chenglong, YANG Jiahai, LI Zhiqi, YIN Qin, XIA Ang, DANG Fangfang
doaj +1 more source
Cryptographic cores are the key components to enforce information security properties related to confidentiality and integrity. Since the security of a cryptographic core implementation and the security of the cryptographic algorithm itself from the ...
MA Yixin +4 more
doaj +1 more source
Robust steganography in practical communication: a comparative study
To realize the act of covert communication in a public channel, steganography is proposed. In the current study, modern adaptive steganography plays a dominant role due to its high undetectability.
Tong Qiao +7 more
doaj +1 more source

