Results 71 to 80 of about 165,246 (172)
Due to the swift advancement of the Internet of Things (IoT), there has been a significant surge in the quantity of interconnected IoT devices that send and exchange vital data across the network. Nevertheless, the frequency of attacks on the Internet of
Weizhe Chen +3 more
doaj +1 more source
Protecting Children in Cyberspace [PDF]
This essay was written for the Essay competition organized by Pakistan Telecommunication Authority on World Telecommunication and Information Society Day May 2009.
Ali, Muhammad
core +1 more source
ASOD: an adaptive stream outlier detection method using online strategy
In the current era of information technology, blockchain is widely used in various fields, and the monitoring of the security and status of the blockchain system is of great concern. Online anomaly detection for the real-time stream data plays vital role
Zhichao Hu +4 more
doaj +1 more source
This study aims to learn the perception of secondary school teachers in Bireuen, Aceh toward the use of classroom teacher administration (AGK) software in filling out the K-13 based student report cards based.
Salma Hayati, Elviana Elviana
doaj +1 more source
A metaheuristic image cryptosystem using improved parallel model and many‐objective optimization
Metaheuristic is one of the techniques to improve the security of image encryption. However, existing metaheuristic image cryptosystems based on metaheuristic may have convergence difficulties during the optimization process, which cause insecurity and ...
Zihao Xin +4 more
doaj +1 more source
Exploring Russian Cyberspace: Digitally-Mediated Collective Action and the Networked Public Sphere [PDF]
This paper summarizes the major findings of a three-year research project to investigate the Internet's impact on Russian politics, media and society.
Bruce Etling +7 more
core
On the essence of cyber space and its relationship with cybernetic space
The subject of the study is understanding of the relationship between the concepts of cyberspace and cybernetic space. The goal is to clarify the essence of the concept of cyberspace and outline its relationship with the cybernetic space. The task is to
Petro Snitsarenko +2 more
doaj +1 more source
HUMAN TRAFFICKING IN CYBERSPACE [PDF]
Once with the spread and use of computers and Internet on a larger scale, trafficking in persons has conquered a new space: cyberspace. The recruitment of victims through the Internet, the use of e-mails for the moral coercion of the victim and ...
Ramona Mihaela MOLDOVAN
core
A chance to seize by women in francophone Africa [PDF]
A rather disillusioned observation was recently made during a pan-Africa conference: Africa women consider new information and communication technologies as "futuristic" rather than a tool for development to be used today.
Mottin-Sylla, Marie-Hélène
core
In the evolving landscape of global trade digitalization, port supply chains play a pivotal role as critical components of international logistics.
Yangbo Chen +5 more
doaj +1 more source

