Sign Up to like & get
recommendations!
0
Published in 2018 at "Ethics and Information Technology"
DOI: 10.1007/s10676-018-9458-4
Abstract: Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and…
read more here.
Keywords:
information;
anonymising technology;
dark anonymising;
going dark ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "Engineering"
DOI: 10.1016/j.eng.2018.01.003
Abstract: Abstract Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are proposed for common…
read more here.
Keywords:
research;
space;
security ecosystem;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Cogent engineering"
DOI: 10.1080/23311916.2020.1859667
Abstract: Bio-inspired intrusion detection solutions provide better detection accuracy than conventional solutions in securing cyberspace. However, existing bio-inspired anomaly-based intrusion detection sys...
read more here.
Keywords:
detection;
bio inspired;
cyberspace;
intrusion detection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2993548
Abstract: Wireless information networks have become a necessity of our day-to-day life. Over a billion Wi-Fi access points, hundreds of thousands of cell towers, and billions of IoT devices, using a variety of wireless technologies, create…
read more here.
Keywords:
cyberspace applications;
cloud;
cyberspace;
benefit big ... See more keywords
Photo by kirp from unsplash
Sign Up to like & get
recommendations!
1
Published in 2022 at "SAGE Open"
DOI: 10.1177/21582440221122739
Abstract: Globally, e-commerce offers unlimited opportunities for corporate organizations to flourish as its customers reside in all parts of the universe. However, given the fluid nature of the cyberspace, black-hat hackers have enormously taken undue advantages…
read more here.
Keywords:
economic sustainability;
black hat;
cyberspace;
corporate organizations ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Crime Science"
DOI: 10.1186/s40163-019-0107-y
Abstract: In this paper we question Farrell and Birks’ assertion of the emergence of cybercrime as an invalid explanation for the crime drop. Alternatively to the “cybercrime hypothesis”, we propose two non-exclusive hypotheses that highlight the…
read more here.
Keywords:
cyberspace;
crime drop;
crime;
farrell birks ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Journal of Medical Ethics and History of Medicine"
DOI: 10.18502/jmehm.v15i10.11566
Abstract: The present study aimed to compile and develop a professional guideline for health-care providers in Iran regarding cyberspace usage. This was a mixed-methods study, conducted in three phases. In the first phase, the principles of…
read more here.
Keywords:
cyberspace;
health care;
professional guideline;
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Symmetry"
DOI: 10.3390/sym12122107
Abstract: Current electronic warfare (EW) systems, along with the rapid development of information and communication technology, are essential elements in the modern battlefield associated with cyberspace. In this study, an efficient evaluation framework is proposed to…
read more here.
Keywords:
effectiveness assessment;
warfare;
method effectiveness;
electronic warfare ... See more keywords