使醉 发表于 2025-3-21 17:01:55
书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0860478<br><br> <br><br>书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0860478<br><br> <br><br>书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0860478<br><br> <br><br>书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0860478<br><br> <br><br>书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0860478<br><br> <br><br>书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0860478<br><br> <br><br>书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0860478<br><br> <br><br>书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0860478<br><br> <br><br>书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0860478<br><br> <br><br>书目名称Safe, Secure, Ethical, Responsible Technologies and Emerging Applications读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0860478<br><br> <br><br>myelography 发表于 2025-3-21 20:52:12
http://reply.papertrans.cn/87/8605/860478/860478_2.png熄灭 发表于 2025-3-22 00:59:30
978-3-031-56395-9ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2024stroke 发表于 2025-3-22 06:59:24
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications978-3-031-56396-6Series ISSN 1867-8211 Series E-ISSN 1867-822X疾驰 发表于 2025-3-22 09:31:39
Examining Potential Harms of Large Language Models (LLMs) in Africatural language data for training inclusive language models. This paper examines the potential harms of LLMs in Africa, covering harms already documented for the African context; harms studied and documented for the Western context, but previously unapplied to Africa; and novel potential harms based鸽子 发表于 2025-3-22 15:27:15
A Gamification Architecture to Enhance Phishing Awarenessotivation, and consideration of a learner’s profile. Subsequently, the problem of the best didactic means is posed with openness to the integration of artificial intelligence, the choice of the type of gamification, and the technologies that can contribute to ensuring that everyone is competent to e黄瓜 发表于 2025-3-22 20:54:59
DIDOR: A Decentralized Identifier Based Onion Routing Protocolintains low communication overhead and latency, and does not require directory servers on which most existing protocols rely. We finally analyze the security of our protocol and demonstrate how it can withstand the denial of service attack on DID documents. Overall, this protocol represents a promisDecibel 发表于 2025-3-22 23:32:32
http://reply.papertrans.cn/87/8605/860478/860478_8.png心痛 发表于 2025-3-23 03:51:28
Correlation Clustering Adapted for Cell Site Management of Mobile Networks in Developing Countriesity parameter. This approach makes it possible to determine the optimal number of cells to allocate to a technician to make his interventions efficient; this will minimize Operational Expenditure (OpEx) and cell downtime due to breakdowns and maximize the quality of service offered to customers.ASSET 发表于 2025-3-23 07:04:19
A Lightweight Authenticated Key Agreement Scheme for Resource-Constrained Devices Based on Implicit ertificates, from which symmetric keys for communication between nodes are derived. We then implement the solution using TelosB sensors in the TOSSIM simulator with an AVL Tree. We evaluate the security and resilience of our proposed scheme through informal analysis and a formal model. The informal