全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Mason Rice , Jonathan Butts , Robert Miller ...
来源:[J].International Journal of Critical Infrastructure Protection(IF 0.63), 2010, Vol.3 (3), pp.118-127
摘要:... However, the current cyberspace health environment is arguably similar to the public health environment that existed in nineteenth century New York City, if not Europe during the Middle Ages. How would the critical infrastructure cope with a pandemic cyberspace infection with...
作者:Peng Lu , Zheng Wang , Shizhao Nie ...
来源:[J].Physica A: Statistical Mechanics and its Applications(IF 1.676), 2018, Vol.503, pp.582-590
摘要:... The whole participation spectrum of cyberspace collective actions contains four stages, such as Access, Browse, Participate, and Offline. There exist three transition probabilities within four stages. This paper focuses on the ratio (second transition probability) betwee...
作者:Stanley D. Brunn
来源:[J].Sustainability, 2014, Vol.6 (10), pp.6576-6603
摘要:... The focus of this paper is on the cyberspace boundaries between and within fields and disciplines studying sustainability; these boundaries separate knowledge gaps or uneven patterns in sustainability scholarship. I use the volume of hyperlinks on Google Search Engine and Goo...
作者:Reind P. van de Riet , Andrea Junk , Ehud Gudes
来源:[J].Data & Knowledge Engineering(IF 1.519), 1997, Vol.24 (1), pp.69-96
摘要:Abstract(#br)In Cyberspace, realized by the Electronic Super-highway and multimedia techniques, persons will be represented by ‘things’ (so called ‘alter-egos’) grown out of the traditional social security numbers. In this paper we will study how the object-oriented meth...
作者:Su Yeon Han , Ming-Hsiang Tsou , Keith C. Clarke
来源:[J].International Journal of Digital Earth(IF 1.222), 2018, Vol.11 (5), pp.451-469
摘要:... Studies have noted the distance decay effect in both cyberspace and real space, showing that interactions occur with an inverse relationship between the number of interactions and the distance between the locations of the interactors. However, these studies rarely provide str...
作者:Reind P. van de Riet
来源:[J].Data & Knowledge Engineering(IF 1.519), 2004, Vol.50 (3), pp.305-339
摘要:Abstract(#br)The refereeing process for the Data & Knowledge Engineering Journal as it is and will be executed in Cyberspace is the subject of this paper, in particular security and privacy aspects. This process can be defined and implemented in the Mokum system; we will show tha...
作者:Kai Yang , Qiang Li , Limin Sun
来源:[J].Computer Networks(IF 1.231), 2018
摘要:Abstract(#br)Nowadays, the cyberspace consists of an increasing number of IoT devices, such as net-printers, webcams, and routers. Illuminating the nature of online devices would provide insights into detecting potentially vulnerable devices on the Internet. However, there is a l...
作者:Gitanjali Madan , Michael E. Stadler , Kim Uhrich ...
来源:[J].International Journal of Pediatric Otorhinolaryngology(IF 1.35), 2011, Vol.75 (5), pp.678-680
摘要:... Further studies are warranted to assess the reach and social impact of these networking sites as portals of health-centered support groups, however, social networking sites and the cyberspace community may be a promising source of support for adolescents with tracheotomies.
作者:Bing Chen , Chengxiang Tan , Xiang Zou
来源:[J].Cluster Computing(IF 0.776), 2017, Vol.20 (1), pp.413-425
摘要:With the rapid prosperity and development of Internet of Things, identity management in cyberspace is becoming more and more important for activities concerning credibility and integrity such as E-commerce and E-government. Personal electronic identities in cyberspace associated ...
作者:Angus M. Marshall BSc CEng MBCS CITP FRSA , Allen C. Clarkson MS, MCSE
来源:[J].Measurement + Control(IF 0.29), 2008, Vol.41
摘要:The authors consider contemporary definitions of cyberspace and explore the nature of crimes in an online environment. Through consideration of “meatspace” criminal activity and its history, they explore the similarities and differences between real world activity and cyberspace...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×