Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Social network behavior and public opinion manipulation
L Chen, J Chen, C **a - Journal of Information Security and Applications, 2022 - Elsevier
The scope of cyberspace weapons is expanding from the physical network domain to the
cognitive information domain. Technologies such as network penetration, public opinion …
cognitive information domain. Technologies such as network penetration, public opinion …
Cyber threats for operational technologies
Most critical sectors worldwide rely on operational technology (OT) whose cybersecurity,
due to the primary need of availability, results to be obsolete and inadequate. Episodes like …
due to the primary need of availability, results to be obsolete and inadequate. Episodes like …
National security 2.0: the cyber security of critical infrastructure
Thanks to technological advancements in recent years, critical infrastructure has become
both irreplaceable for modern social life—and highly vulnerable. Safe, effective and efficient …
both irreplaceable for modern social life—and highly vulnerable. Safe, effective and efficient …
Effects of 'Digital'Country's Information Security on Political Stability
TA Nguyen, K Koblandin… - Journal of Cyber …, 2022 - journals.riverpublishers.com
In this day and age, information security is becoming a priority not only in the system of
international economic relations but also at the state level. This study aims to study the effect …
international economic relations but also at the state level. This study aims to study the effect …
Securing e-Estonia: challenges, insecurities, opportunities
A Hardy - Royal Holloway, University of London, 2022 - papers.ssrn.com
Estonia, as a nation, has progressed considerably since the resumption of independence in
1991. A national embrace of digital technology has been integral to the modernisation of the …
1991. A national embrace of digital technology has been integral to the modernisation of the …
An assessment of the sustainability of living for Rohingya displaced people in cox's bazar camps in Bangladesh
Ensuring human rights and fundamental needs of the forcefully displaced Myanmar
nationals (FDMN), also known as the Rohingyas, has become a critical concern for the host …
nationals (FDMN), also known as the Rohingyas, has become a critical concern for the host …
Juridical Analysis of Public Information Disclosure in Government Systems in the Digital Era
This article conducts a juridical analysis of public information disclosure in government
systems in the digital era. The purpose of compiling this article is to identify legal issues …
systems in the digital era. The purpose of compiling this article is to identify legal issues …
India's Cyber Warfare Capabilities: Repercussions For Pakistan's National Security
MN Ashraf, SA Kayani - NDU Journal, 2023 - ndujournal.ndu.edu.pk
Cyber warfare refers to a state's ability to penetrate another state's digital systems to cause
disruption. Cyber warfare has emerged as the fifth operational warfighting domain. India has …
disruption. Cyber warfare has emerged as the fifth operational warfighting domain. India has …
[BOOK][B] The Open World, Hackbacks and Global Justice
AJ Thomas - 2023 - Springer
One of the greatest gifts bestowed upon the global community by the Western world is the
belief that persons, information, good and services, and access to commonly cherished …
belief that persons, information, good and services, and access to commonly cherished …
Cyber hegemony and information warfare: A case of Russia
A Rashid, AY Khan, SW Azim - Liberal Arts and Social Sciences …, 2021 - ideapublishers.org
The world has shifted to a digital landscape in the recent decade with both its perks and
underlying threats. Russia, throughout history has experimented with its information along …
underlying threats. Russia, throughout history has experimented with its information along …