indifferent 发表于 2025-3-28 14:34:55

Zahri Yunos,Rabiah Ahmad,Syahrir Mat Ali,Solahuddin Shamsuddin

支柱 发表于 2025-3-28 19:17:20

http://reply.papertrans.cn/47/4693/469299/469299_42.png

保留 发表于 2025-3-28 23:16:33

Xin Xia,Xiaohu Yang,Chao Wu,Shanping Li,Linfeng Bao

diathermy 发表于 2025-3-29 04:24:24

http://reply.papertrans.cn/47/4693/469299/469299_44.png

等级的上升 发表于 2025-3-29 08:39:40

Mustafa Amir Faisal,Zeyar Aung,John R. Williams,Abel Sanchez

Ointment 发表于 2025-3-29 12:40:58

Jakub Valcik,Jan Sedmidubsky,Michal Balazia,Pavel Zezula

Palpate 发表于 2025-3-29 18:21:31

Jia Yu,Shuguang Wang,Huawei Zhao,Minglei Shu,Jialiang Lv,Qiang Guo

生气地 发表于 2025-3-29 20:53:00

Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Regioniminary stage, there is a great possibility that the virtual world evolves and plays a critical role in promoting illicit activities and terrorism in cyberspace. Future studies in this area can be conducted, which may lead to the development of better strategy and policy framework to counter cyber t

成份 发表于 2025-3-30 01:07:57

Information Credibility on Twitter in Emergency Situationed to the user social behavior, the tweet content, the tweet topic and the tweet diffusion are extracted. A supervised method using learning Bayesian Network is used to predict the tweets credibility in emergency situation. Experiments with the tweets of UK Riots related topics show that our procedu

舰旗 发表于 2025-3-30 04:30:05

http://reply.papertrans.cn/47/4693/469299/469299_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Intelligence and Security Informatics; Pacific Asia Worksho Michael Chau,G. Alan Wang,Hsinchun Chen Conference proceedings 2012 Springer-Ve