|
|
|
Ahlam Fakieh and Aymen Akremi
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper stud...
ver más
|
|
|
|
|
|
Marta Ribeiro, Joost Ellerbroek and Jacco Hoekstra
Future operations involving drones are expected to result in traffic densities that are orders of magnitude higher than any observed in manned aviation. Current geometric conflict resolution (CR) methods have proven to be very efficient at relatively mod...
ver más
|
|
|
|
|
|
Wei Wang, Xuefeng Hong, Jue Qu, Ning Xu and Tong Chen
A complex command and control task was selected as the test task, which included observing the overall and local situation, the interactive operation and situation display of detection equipment, the erection and launch of air defense equipment, and the ...
ver más
|
|
|
|
|
|
Xiang Chen, Shouzhi Xu, Kai Ma and Peng Chen
A consortium system can leverage information to improve workflows, accountability, and transparency through setting up a backbone for these cross-company and cross-discipline solutions, which make it become a hot spot of market application. Users of a co...
ver más
|
|
|
|
|
|
Emilio Matricciani
The purpose of the paper is to extend the general theory of translation to texts written in the same language and show some possible applications. The main result shows that the mutual mathematical relationships of texts in a language have been saved or ...
ver más
|
|
|