標(biāo)題: Titlebook: Applications for Artificial Intelligence and Digital Forensics in National Security; Reza Montasari Book 2023 The Editor(s) (if applicable [打印本頁(yè)] 作者: irritants 時(shí)間: 2025-3-21 20:08
書目名稱Applications for Artificial Intelligence and Digital Forensics in National Security影響因子(影響力)
書目名稱Applications for Artificial Intelligence and Digital Forensics in National Security影響因子(影響力)學(xué)科排名
書目名稱Applications for Artificial Intelligence and Digital Forensics in National Security網(wǎng)絡(luò)公開度
書目名稱Applications for Artificial Intelligence and Digital Forensics in National Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Applications for Artificial Intelligence and Digital Forensics in National Security被引頻次
書目名稱Applications for Artificial Intelligence and Digital Forensics in National Security被引頻次學(xué)科排名
書目名稱Applications for Artificial Intelligence and Digital Forensics in National Security年度引用
書目名稱Applications for Artificial Intelligence and Digital Forensics in National Security年度引用學(xué)科排名
書目名稱Applications for Artificial Intelligence and Digital Forensics in National Security讀者反饋
書目名稱Applications for Artificial Intelligence and Digital Forensics in National Security讀者反饋學(xué)科排名
作者: 地殼 時(shí)間: 2025-3-21 23:11 作者: 虛情假意 時(shí)間: 2025-3-22 01:15
Emotions and Gender in Byzantine Cultureerations or in response to a natural disaster. The benefits these drones offer are unquestionable. However, these drones are increasingly being deployed for a less self-evident and legitimate purpose: surveillance. The recourse to drones for surveillance operations is highly problematic, given its i作者: 肉體 時(shí)間: 2025-3-22 06:26
Emotions and Gender in Byzantine Cultured online: a qualitative, guantitative, and cross-lingual analysis. New America Foundation, 2013). While the Internet is widely utilised in everyday life to distribute and share information, it has also created an environment in which virtual societies have become a breeding ground for new risks and 作者: 滔滔不絕地說(shuō) 時(shí)間: 2025-3-22 08:43 作者: Immunotherapy 時(shí)間: 2025-3-22 13:59
Media Representation of Loneliness in Chinalogies are incorporated into organisations’ processes and on the cyber threat landscape. The pandemic led society and institutions to a global accelerated digitalisation, and in doing so reshaped the landscape in which cybercrime and cybersecurity operate (Horgan et al. in J Crim Psychol 11:222–239,作者: 嘲弄 時(shí)間: 2025-3-22 18:57 作者: 殖民地 時(shí)間: 2025-3-22 21:55
Valentina Marinescu,Ecaterina Balicas, the Internet of Things (IoT) Forensics, admissibility of digital evidence, lack of standardisation, limitations of tools in the field, as well as the significant problems associated with case backlogs within DF. Following the evaluation, the paper offers a set of recommendations that can be adopt作者: Cursory 時(shí)間: 2025-3-23 05:02 作者: 輕浮女 時(shí)間: 2025-3-23 06:47
Emiliana De Blasio,Donatella Selvausses visual propaganda as a growing phenomenon within these extremist groups, whilst considering the comparison with textual propaganda and why extremist groups such as ISIS have increased their use of visual content. In terms of the key online strategies, the chapter specifically focuses on invest作者: 是突襲 時(shí)間: 2025-3-23 10:58 作者: outset 時(shí)間: 2025-3-23 15:57 作者: Incommensurate 時(shí)間: 2025-3-23 18:58 作者: 貧窮地活 時(shí)間: 2025-3-23 22:27 作者: BOOR 時(shí)間: 2025-3-24 06:12
978-3-031-40120-6The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: exhibit 時(shí)間: 2025-3-24 07:30 作者: 防水 時(shí)間: 2025-3-24 13:56 作者: 意見一致 時(shí)間: 2025-3-24 18:05 作者: Opponent 時(shí)間: 2025-3-24 22:45
Facial Recognition Technology, Drones, and Digital Policing: Compatible with the Fundamental Right h facial recognition technology. Consequently, this paper will critically examine law enforcement’s recourse to facial recognition technology in drones and the worrying consequences of such deployment on citizens’ fundamental right to privacy.作者: 有雜色 時(shí)間: 2025-3-25 00:22 作者: Embolic-Stroke 時(shí)間: 2025-3-25 03:21
Book 2023 international security landscape. The digital policing landscape is dynamic and intricate, emanating from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have a significant impact on soci作者: 束縛 時(shí)間: 2025-3-25 11:18
1613-5113 onal security strategy that is both adaptable and responsive.This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape. The digital policing landscape is dynamic and intricate作者: 條約 時(shí)間: 2025-3-25 12:48 作者: 嚴(yán)重傷害 時(shí)間: 2025-3-25 18:55 作者: gene-therapy 時(shí)間: 2025-3-25 21:43 作者: 傲慢物 時(shí)間: 2025-3-26 03:36
Facial Recognition Technology, Drones, and Digital Policing: Compatible with the Fundamental Right erations or in response to a natural disaster. The benefits these drones offer are unquestionable. However, these drones are increasingly being deployed for a less self-evident and legitimate purpose: surveillance. The recourse to drones for surveillance operations is highly problematic, given its i作者: Adrenaline 時(shí)間: 2025-3-26 05:25
The Use of the Internet for Terrorist Purposes: Investigating the Growth of Online Terrorism and Exd online: a qualitative, guantitative, and cross-lingual analysis. New America Foundation, 2013). While the Internet is widely utilised in everyday life to distribute and share information, it has also created an environment in which virtual societies have become a breeding ground for new risks and 作者: 帽子 時(shí)間: 2025-3-26 08:53
Cyber-Security and the Changing Landscape of Critical National Infrastructure: State and Non-state s by clarifying the term critical national infrastructure. It then proceeds to highlight the rise in international incidents of cyber-attacks on critical national?infrastructure. Vignette?case studies, drawn from countries such Australia, USA, Ukraine and the UK are integrated into the analysis for 作者: antecedence 時(shí)間: 2025-3-26 13:28
,Police and Cybercrime: Evaluating Law Enforcement’s Cyber Capacity and Capability,logies are incorporated into organisations’ processes and on the cyber threat landscape. The pandemic led society and institutions to a global accelerated digitalisation, and in doing so reshaped the landscape in which cybercrime and cybersecurity operate (Horgan et al. in J Crim Psychol 11:222–239,作者: 吹牛大王 時(shí)間: 2025-3-26 16:52 作者: Osteons 時(shí)間: 2025-3-26 23:51 作者: 樹木心 時(shí)間: 2025-3-27 02:21
A Critical Analysis: Key Strategies of Far-Right Online Visual Propaganda,e efforts to remove extremist and hateful content. This chapter will critically explore the academic literature which considers how far-right actors are taking advantages of the affordances of online communication routes to spread visual propaganda. Three key strategies which emerge from the literat作者: ungainly 時(shí)間: 2025-3-27 08:41 作者: 歹徒 時(shí)間: 2025-3-27 11:07
Applications for Artificial Intelligence and Digital Forensics in National Security作者: Devastate 時(shí)間: 2025-3-27 15:57
A Balance of Power: Exploring the Opportunities and Challenges of AI for a Nation,s chapter presents how Artificial Intelligence technology is extremely important in how it can shape the strength and power of a nation. Moreover, it highlights how AI can both positively and negatively impact a nation’s security. In summary, the chapter will provide a detailed overview of AI, it wi作者: 咒語(yǔ) 時(shí)間: 2025-3-27 18:21 作者: 哥哥噴涌而出 時(shí)間: 2025-3-27 22:21 作者: 倔強(qiáng)不能 時(shí)間: 2025-3-28 02:14
,Police and Cybercrime: Evaluating Law Enforcement’s Cyber Capacity and Capability,and the wider law enforcement community encounter when responding to cybercrime. In view of this, the chapter also aims to assess law enforcement’s cyber capacity and capability concerning their fight against cybercrime.作者: 通知 時(shí)間: 2025-3-28 08:34 作者: Pelago 時(shí)間: 2025-3-28 12:04 作者: Retrieval 時(shí)間: 2025-3-28 18:10
A Critical Analysis: Key Strategies of Far-Right Online Visual Propaganda,edia systems to garner more visibility through manipulating and framing imagery. Lastly, considerations will be made towards how humour through meme images and board subculture have been used as a strategy to lower the boundary for the participation in extremist ideology.作者: SOB 時(shí)間: 2025-3-28 20:58 作者: 去才蔑視 時(shí)間: 2025-3-28 23:42 作者: 車床 時(shí)間: 2025-3-29 06:53
Emotions and Gender in Byzantine Culturethis end, the chapter will first investigate the role of the Internet in promoting the online radicalisation process, which leads to participation in terrorist acts. It will then critically examine how the Internet alters the nature of violent extremism, including its fatal consequences in the real 作者: 陰謀小團(tuán)體 時(shí)間: 2025-3-29 07:32
Emotions and Gender in Byzantine Culture using malware, in contrast to the relatively high?cost and logistical complexity of mounting physical attacks on well protected critical national infrastructure sites. One of the main conclusions drawn from the analysis is the extent to which?addressing vulnerabilities in critical national infrastr作者: 掙扎 時(shí)間: 2025-3-29 14:33