|
|
|
Arturo J. Fernández
Confidence regions for the Weibull parameters with minimum areas among all those based on the Conditionality Principle are constructed using an equivalent diffuse Bayesian approach. The process is valid for scenarios involving standard failure and progre...
ver más
|
|
|
|
|
|
|
Junqiang Chen, Guang Cheng and Hantao Mei
Tor is widely used to protect users? privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Sno...
ver más
|
|
|
|
|
|
|
Nane Kratzke
Background: This study presents a graph-based, macro-scale, polarity-based, echo chamber detection approach for Twitter. Echo chambers are a concern as they can spread misinformation, and reinforce harmful stereotypes and biases in social networks. Metho...
ver más
|
|
|
|
|
|
|
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr...
ver más
|
|
|
|
|
|
|
Dilovar Salimov
Pág. 126 - 133
The article examines the situation of online media as a new challenge to the ideology of the Tajik state. At the same time, the main emphasis is on the formation of a network society and its impact on the transformation of the political life of the count...
ver más
|
|
|
|
|
|
|
Leonardo Ranaldi, Federico Ranaldi, Francesca Fallucchi and Fabio Massimo Zanzotto
Online users tend to hide their real identities by adopting different names on the Internet. On Facebook or LinkedIn, for example, people usually appear with their real names. On other standard websites, such as forums, people often use nicknames to prot...
ver más
|
|
|
|
|
|
|
Louis Edward Papa and Thaier Hayajneh
This paper examines the phenomenon of digital persecution in the Global South and evaluates tools that defend against it. First, the paper explains the nature of persecution and its digital incarnation. It then provides a contextual overview of real-worl...
ver más
|
|
|
|
|
|
|
Laura Studen and Victor Tiberius
Over the past two decades, social media have become a crucial and omnipresent cultural and economic phenomenon, which has seen platforms come and go and advance technologically. In this study, we explore the further development of social media regarding ...
ver más
|
|
|
|
|
|
|
Alejandro Ivan Aguirre-Salado, Humberto Vaquera-Huerta, Carlos Arturo Aguirre-Salado, José del Carmen Jiménez-Hernández, Franco Barragán and María Guzmán-Martínez
We introduced a novel spatial model based on the distribution of generalized extreme values (GEV) to analyze the maximum intensity levels of earthquakes with incomplete data (randomly censored) on the Pacific coast of southern Mexico using a random censo...
ver más
|
|
|
|
|
|
|
Francisco José ARANDA SERNA,Javier BELDA INIESTA
Pág. 5 - 12
|
|
|
|