A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness [0.03%]
一种关于网络拓扑和活动结果的三维混合现实可视化可改善网络二人组团队沟通和态势感知能力
Torvald F Ask,Kaur Kullman,Stefan Sütterlin et al.
Torvald F Ask et al.
Background: Cyber defense decision-making during cyber threat situations is based on human-to-human communication aiming to establish a shared cyber situational awareness. Previous studies suggested that communication ine...
Daniela van Geenen,Jonathan W Y Gray,Liliana Bounegru et al.
Daniela van Geenen et al.
Networks have risen to prominence as intellectual technologies and graphical representations, not only in science, but also in journalism, activism, policy, and online visual cultures. Inspired by approaches taking trouble as occasion to (r...
Predicting the distribution of COVID-19 through CGAN-Taking Macau as an example [0.03%]
基于CGAN的新冠肺炎疫情预测方法及应用——以澳门特区为例
Liang Zheng,Yile Chen,Shan Jiang et al.
Liang Zheng et al.
Machine learning (ML) is an innovative method that is widely used in data prediction. Predicting the COVID-19 distribution using ML is essential for urban security risk assessment and governance. This study uses conditional generative adver...
A machine learning approach to quantify gender bias in collaboration practices of mathematicians [0.03%]
一种量化数学家合作实践中性别偏见的机器学习方法
Christian Steinfeldt,Helena Mihaljević
Christian Steinfeldt
Collaboration practices have been shown to be crucial determinants of scientific careers. We examine the effect of gender on coauthorship-based collaboration in mathematics, a discipline in which women continue to be underrepresented, espec...
Sharing social media data: The role of past experiences, attitudes, norms, and perceived behavioral control [0.03%]
社交媒体数据共享:过去经验、态度、规范和感知行为控制的作用
Esra Akdeniz,Kerrin Emilia Borschewski,Johannes Breuer et al.
Esra Akdeniz et al.
Social media data (SMD) have become an important data source in the social sciences. The purpose of this paper is to investigate the experiences and practices of researchers working with SMD in their research and gain insights into research...
Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review [0.03%]
基于区块链的访问控制以防止物联网中的网络攻击:系统回顾文献
Rinki Singh,Deepika Kukreja,Deepak Kumar Sharma
Rinki Singh
Internet of Things (IoT) enables communication among objects to collect information and make decisions to improve the quality of life. There are several unresolved security and privacy concerns in IoT due to multiple resource constrained de...
Flood risk assessment for residences at the neighborhood scale by owner/occupant type and first-floor height [0.03%]
基于房主/住户类型和一层高度的住宅区尺度住屋洪水风险评估
Ayat Al Assi,Rubayet Bin Mostafiz,Carol J Friedland et al.
Ayat Al Assi et al.
Evaluating flood risk is an essential component of understanding and increasing community resilience. A robust approach for quantifying flood risk in terms of average annual loss (AAL) in dollars across multiple homes is needed to provide v...
Nazla Bushra,Robert V Rohli,Chunyan Li et al.
Nazla Bushra et al.
The tropospheric circumpolar vortex (CPV), an important signature of processes steering the general atmospheric circulation, surrounds each pole and is linked to the surface weather conditions. The CPV can be characterized by its area and c...
Audio deepfakes: A survey [0.03%]
音频深度伪造技术综述
Zahra Khanjani,Gabrielle Watson,Vandana P Janeja
Zahra Khanjani
A deepfake is content or material that is synthetically generated or manipulated using artificial intelligence (AI) methods, to be passed off as real and can include audio, video, image, and text synthesis. The key difference between manual...
Jovana Davidovic
Jovana Davidovic
Meaningful human control over AI is exalted as a key tool for assuring safety, dignity, and responsibility for AI and automated decision-systems. It is a central topic especially in fields that deal with the use of AI for decisions that cou...