46   Artículos

 
en línea
Arturo J. Fernández    
Confidence regions for the Weibull parameters with minimum areas among all those based on the Conditionality Principle are constructed using an equivalent diffuse Bayesian approach. The process is valid for scenarios involving standard failure and progre... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Junqiang Chen, Guang Cheng and Hantao Mei    
Tor is widely used to protect users? privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Sno... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nane Kratzke    
Background: This study presents a graph-based, macro-scale, polarity-based, echo chamber detection approach for Twitter. Echo chambers are a concern as they can spread misinformation, and reinforce harmful stereotypes and biases in social networks. Metho... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo    
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dilovar Salimov     Pág. 126 - 133
The article examines the situation of online media as a new challenge to the ideology of the Tajik state. At the same time, the main emphasis is on the formation of a network society and its impact on the transformation of the political life of the count... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Leonardo Ranaldi, Federico Ranaldi, Francesca Fallucchi and Fabio Massimo Zanzotto    
Online users tend to hide their real identities by adopting different names on the Internet. On Facebook or LinkedIn, for example, people usually appear with their real names. On other standard websites, such as forums, people often use nicknames to prot... ver más
Revista: Information    Formato: Electrónico

 
en línea
Louis Edward Papa and Thaier Hayajneh    
This paper examines the phenomenon of digital persecution in the Global South and evaluates tools that defend against it. First, the paper explains the nature of persecution and its digital incarnation. It then provides a contextual overview of real-worl... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Laura Studen and Victor Tiberius    
Over the past two decades, social media have become a crucial and omnipresent cultural and economic phenomenon, which has seen platforms come and go and advance technologically. In this study, we explore the further development of social media regarding ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Alejandro Ivan Aguirre-Salado, Humberto Vaquera-Huerta, Carlos Arturo Aguirre-Salado, José del Carmen Jiménez-Hernández, Franco Barragán and María Guzmán-Martínez    
We introduced a novel spatial model based on the distribution of generalized extreme values (GEV) to analyze the maximum intensity levels of earthquakes with incomplete data (randomly censored) on the Pacific coast of southern Mexico using a random censo... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Francisco José ARANDA SERNA,Javier BELDA INIESTA     Pág. 5 - 12

« Anterior     Página: 1 de 3     Siguiente »