Results 21 to 30 of about 165,246 (172)
Let Your CyberAlter Ego Share Information and Manage Spam [PDF]
Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of
Boykin, P. Oscar +4 more
core +1 more source
CTFN: Multistage CNN-Transformer Fusion Network for ECG Authentication
In the face of the mounting challenges posed by cybersecurity threats, there is an imperative for the development of robust identity authentication systems to safeguard sensitive user data.
Heng Jia +7 more
doaj +1 more source
Mapping cyberspace: visualising, analysing and exploring virtual worlds [PDF]
In the past years, with the development of computer networks such as the Internet and world wide web (WWW), cyberspace has been increasingly studied by researchers in various disciplines such as computer sciences, sociology, geography, and cartography
Jiang, B., Ormeling, F.
core
Feature Graph Construction With Static Features for Malware Detection
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou +6 more
doaj +1 more source
International Liability in Cyberspace [PDF]
Activities in cyberspace often expose companies to cybertorts , a species of tort particularly difficult to reconcile with standard insurance policies.
Crane, Matthew
core +1 more source
The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for ...
Cohen, Julie E.
core +1 more source
Virtual reality: Theoretical basis, practical applications [PDF]
Virtual reality (VR) is a powerful multimedia visualization technique offering a range of mechanisms by which many new experiences can be made available.
Barker, Philip
core +3 more sources
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
We propose a one-time blind signature scheme based on coding theory, which is improved on the basis of the SHMWW protocol. By adding two blinding factors, the anonymity of users is protected.
Haiyan Xiu +3 more
doaj +1 more source
Equality of Arms in the Digital Age [PDF]
Electronic commerce is important, and perhaps, inevitable. Thus to consider the legal implications of the growth and development of electronic commerce is essential.
Haloush, Haitham +2 more
core
A Provably Secure Authentication Protocol Based on PUF and ECC for IoT Cloud-Edge Environments
The Internet of Things (IoT) cloud model provides an efficient scheme for rapid collection, storage, processing, and analysis of massive node data, and its application has gradually expanded to key areas such as healthcare and transportation.
Xiong Wang +4 more
doaj +1 more source

