Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] The first two months in the war in Ukraine through topic modeling and sentiment analysis
C Maathuis, I Kerkhof - Regional Science Policy & Practice, 2023 - Elsevier
In recent years, social media remained not only an environment for expression, but it also
became an active battlefield where its users emulate their thoughts, feelings, beliefs, and …
became an active battlefield where its users emulate their thoughts, feelings, beliefs, and …
On explainable AI solutions for targeting in cyber military operations
C Maathuis - International Conference on Cyber Warfare and …, 2022 - books.google.com
Nowadays, it is hard to recall a domain, system, or problem that does not use, embed, or
could be tackled through AI. From early stages of its development, its techniques and …
could be tackled through AI. From early stages of its development, its techniques and …
Human Centered Explainable AI Framework for Military Cyber Operations
C Maathuis - MILCOM 2023-2023 IEEE Military …, 2023 - ieeexplore.ieee.org
Through recent advancements, AI stands as a transformative force by resha** societal
domains and strategies. In the military cyber domain, this transformation pivots on data and …
domains and strategies. In the military cyber domain, this transformation pivots on data and …
[PDF][PDF] On the road to designing responsible AI systems in military cyber operations
C Maathuis - … Conference on Cyber Warfare and Security, 2022 - pdfs.semanticscholar.org
Military cyber operations are increasingly integrating or relying to a specific degree on AI-
based systems in one or more moments of their phases where stakeholders are involved …
based systems in one or more moments of their phases where stakeholders are involved …
An ontology for effective security incident management
With the evolution of technologies like Internet of Things (IoTs), there will be more and more
connected devices in use around the world. This is one of the reasons why cyber security is …
connected devices in use around the world. This is one of the reasons why cyber security is …
Responsible digital security behaviour: Definition and assessment model
Digital landscape transforms remarkably and grows exponentially tackling important societal
challenges and needs. In the modern age, futuristic digital concepts are ideated and …
challenges and needs. In the modern age, futuristic digital concepts are ideated and …
Develo** a cyber operations computational ontology
Cyber operations lack models, methodologies, and mechanisms to describe relevant data
and knowledge. This problem is directly reflected when cyber operations are conducted and …
and knowledge. This problem is directly reflected when cyber operations are conducted and …
Social Media Manipulation Deep Learning based Disinformation Detection
C Maathuis, R Godschalk - International Conference on Cyber …, 2023 - search.proquest.com
The rapid grow and use of different social platforms enhanced communication between
different entities and their audiences plus the transformation through digitalization of …
different entities and their audiences plus the transformation through digitalization of …
Assessment methodology for collateral damage and military (Dis) Advantage in cyber operations
Cyber Operations stopped being utopia or Sci-Fi based scenarios: they became reality.
When planning and conducting them, military actors encounter difficulties since they lack …
When planning and conducting them, military actors encounter difficulties since they lack …
Semantic approach in encoding of the meanings in Bulgarian Folklore embroidery in digital libraries
D Baeva, B Baev - 2019 42nd International Convention on …, 2019 - ieeexplore.ieee.org
The purpose of this article is to describe the architectural approach in building a knowledge
base for the Bulgarian national embroidery, in which its subjective characteristics are …
base for the Bulgarian national embroidery, in which its subjective characteristics are …