Results 71 to 80 of about 165,246 (172)

Large-scale IoT attack detection scheme based on LightGBM and feature selection using an improved salp swarm algorithm

open access: yesScientific Reports
Due to the swift advancement of the Internet of Things (IoT), there has been a significant surge in the quantity of interconnected IoT devices that send and exchange vital data across the network. Nevertheless, the frequency of attacks on the Internet of
Weizhe Chen   +3 more
doaj   +1 more source

Protecting Children in Cyberspace [PDF]

open access: yes
This essay was written for the Essay competition organized by Pakistan Telecommunication Authority on World Telecommunication and Information Society Day May 2009.
Ali, Muhammad
core   +1 more source

ASOD: an adaptive stream outlier detection method using online strategy

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
In the current era of information technology, blockchain is widely used in various fields, and the monitoring of the security and status of the blockchain system is of great concern. Online anomaly detection for the real-time stream data plays vital role
Zhichao Hu   +4 more
doaj   +1 more source

PERSEPSI GURU MI KABUPATEN BIREUEN TERHADAP PENGGUNAAN APLIKASI GURU KELAS (AGK) DALAM PENGISIAN RAPOR BERBASIS K-13

open access: yesCyberspace, 2019
This study aims to learn the perception of secondary school teachers in Bireuen, Aceh toward the use of classroom teacher administration (AGK) software in filling out the K-13 based student report  cards based.
Salma Hayati, Elviana Elviana
doaj   +1 more source

A metaheuristic image cryptosystem using improved parallel model and many‐objective optimization

open access: yesIET Image Processing
Metaheuristic is one of the techniques to improve the security of image encryption. However, existing metaheuristic image cryptosystems based on metaheuristic may have convergence difficulties during the optimization process, which cause insecurity and ...
Zihao Xin   +4 more
doaj   +1 more source

Exploring Russian Cyberspace: Digitally-Mediated Collective Action and the Networked Public Sphere [PDF]

open access: yes, 2012
This paper summarizes the major findings of a three-year research project to investigate the Internet's impact on Russian politics, media and society.
Bruce Etling   +7 more
core  

On the essence of cyber space and its relationship with cybernetic space

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni
The subject of the study is understanding of the relationship between the concepts of cyberspace and cybernetic space. The goal is to clarify the essence of the concept of cyberspace and outline its relationship with the cybernetic space. The task is to
Petro Snitsarenko   +2 more
doaj   +1 more source

HUMAN TRAFFICKING IN CYBERSPACE [PDF]

open access: yes
Once with the spread and use of computers and Internet on a larger scale, trafficking in persons has conquered a new space: cyberspace. The recruitment of victims through the Internet, the use of e-mails for the moral coercion of the victim and ...
Ramona Mihaela MOLDOVAN
core  

A chance to seize by women in francophone Africa [PDF]

open access: yes, 2010
A rather disillusioned observation was recently made during a pan-Africa conference: Africa women consider new information and communication technologies as "futuristic" rather than a tool for development to be used today.
Mottin-Sylla, Marie-Hélène
core  

A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms

open access: yesScientific Reports
In the evolving landscape of global trade digitalization, port supply chains play a pivotal role as critical components of international logistics.
Yangbo Chen   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy