標題: Titlebook: Big Data-driven World: Legislation Issues and Control Technologies; Alla G. Kravets Book 2019 Springer Nature Switzerland AG 2019 Big Data [打印本頁] 作者: 多愁善感 時間: 2025-3-21 16:31
書目名稱Big Data-driven World: Legislation Issues and Control Technologies影響因子(影響力)
書目名稱Big Data-driven World: Legislation Issues and Control Technologies影響因子(影響力)學(xué)科排名
書目名稱Big Data-driven World: Legislation Issues and Control Technologies網(wǎng)絡(luò)公開度
書目名稱Big Data-driven World: Legislation Issues and Control Technologies網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Big Data-driven World: Legislation Issues and Control Technologies被引頻次
書目名稱Big Data-driven World: Legislation Issues and Control Technologies被引頻次學(xué)科排名
書目名稱Big Data-driven World: Legislation Issues and Control Technologies年度引用
書目名稱Big Data-driven World: Legislation Issues and Control Technologies年度引用學(xué)科排名
書目名稱Big Data-driven World: Legislation Issues and Control Technologies讀者反饋
書目名稱Big Data-driven World: Legislation Issues and Control Technologies讀者反饋學(xué)科排名
作者: Gudgeon 時間: 2025-3-21 23:02
Big Data-driven World: Legislation Issues and Control Technologies作者: monogamy 時間: 2025-3-22 03:06 作者: Parabola 時間: 2025-3-22 07:45 作者: 煩人 時間: 2025-3-22 09:31 作者: 惹人反感 時間: 2025-3-22 13:54 作者: Decimate 時間: 2025-3-22 20:11 作者: tenosynovitis 時間: 2025-3-22 23:30
The Remote Approach of Distribution of Objects Withdrawn from Circulation: Means, Legislation Issuesnd video images and other content; proper identification of users; restrictions on the use of anonymizers, as well as on the use of Internet resources by persons previously convicted of certain crimes; making the owners of the Internet resources responsible for posting prohibited information by user作者: emission 時間: 2025-3-23 04:04 作者: Hearten 時間: 2025-3-23 08:52
Counteracting the Spread of Socially Dangerous Information on the Internet: A Comparative Legal Studex and interdisciplinary approach to understanding the phenomenon of negative content is substantiated. Such approach will allow, in accordance with the modern scientific methodology of cognition, to construct a model explaining the specifics, structure, and dynamics of the dissemination of socially作者: Nutrient 時間: 2025-3-23 09:56 作者: 拋媚眼 時間: 2025-3-23 14:57
Analysis of High-Technology Mechanisms of Extremist and Terrorist Activities Financingthem in order to bring the perpetrators to criminal liability. The findings revealed in the course of the study indicate that the most important direction in counteracting terrorist and extremist activities is to neutralize the ways of financing them and eliminate sources of criminal proceeds, as we作者: Resection 時間: 2025-3-23 19:43
Radio-Electronic Warfare as a Conflict Interaction in the Information Spacen the information conflict. The conceptual bases and prospects of the development of the EW subject area are discussed on the basis of modern technological achievements, digital methods of signal processing in information communication systems, management of information systems and media. The peculi作者: Receive 時間: 2025-3-24 00:19
Metaverse in the Technological World,al model of CA, describing the cause-effect relationship between the elements of CA and, in fact, CA technology; process model that reflects the life cycle of activity and its elements. The role of information in the process of implementing the CA is considered. Significant factors of the role of in作者: chandel 時間: 2025-3-24 02:29
https://doi.org/10.1007/978-981-99-7397-2ion of minimizing lost profits. The proposed system is successfully applied to the development of territorial development management systems, enterprises, personnel competence level and others. In the DMS technology, several mathematical models and methods are used. Basically, there is the “cost-eff作者: 傲慢人 時間: 2025-3-24 10:13
Basic Concepts on Optimization Algorithms,ing in social systems are non-linear in nature. The chapter determines the possibility of more complete use of textual or qualitative data of a social system for modeling its activities on the basis of similarity theory. The obtained results create prerequisites for the development of methods for mo作者: 致命 時間: 2025-3-24 14:39 作者: PRO 時間: 2025-3-24 18:02 作者: 腐蝕 時間: 2025-3-24 19:17 作者: magnanimity 時間: 2025-3-25 01:36 作者: Acquired 時間: 2025-3-25 05:20 作者: 控制 時間: 2025-3-25 08:03 作者: Talkative 時間: 2025-3-25 13:01
https://doi.org/10.1007/978-3-030-92377-8them in order to bring the perpetrators to criminal liability. The findings revealed in the course of the study indicate that the most important direction in counteracting terrorist and extremist activities is to neutralize the ways of financing them and eliminate sources of criminal proceeds, as we作者: overrule 時間: 2025-3-25 16:41 作者: MUT 時間: 2025-3-25 22:20
2198-4182 e conditions of new challenges of dissemination and accessibility of socially dangerous information. Systematization of successful experience of the Big Data solutions implementation in the different countries 978-3-030-13174-6978-3-030-01358-5Series ISSN 2198-4182 Series E-ISSN 2198-4190 作者: FLACK 時間: 2025-3-26 02:36 作者: 贊美者 時間: 2025-3-26 07:21
978-3-030-13174-6Springer Nature Switzerland AG 2019作者: famine 時間: 2025-3-26 10:57
Metaverse in the Technological World,dological aspects of integrated activities is an urgent task. The methodological basis of the research is a system analysis, as well as the theory of multi-agent systems. The main trends distinguishing the “digital” economy from “non-digital” one are highlighted based on the systematic approach. The作者: Intersect 時間: 2025-3-26 15:40
https://doi.org/10.1007/978-981-99-7397-2ay. The leading Russian experts in strategic management have developed information technologies to improve the efficiency of activities in virtually all spheres of social and economic systems. Such technologies include the technology of working out development management systems (DMS). The research 作者: 禁止 時間: 2025-3-26 18:27 作者: pericardium 時間: 2025-3-26 22:49 作者: aneurysm 時間: 2025-3-27 02:30
Linear Partial Differential Equationsthe protection of transmitted information from unauthorized access by third parties, remains an important scientific and practical task. The chapter deals with the formation of a newly modified set of orthogonal signals, the mathematical models of which are the modified set of piecewise constant ort作者: 里程碑 時間: 2025-3-27 07:29 作者: Engaged 時間: 2025-3-27 09:56
Undergraduate Lecture Notes in Physicsasting the trends in the development of all possible spheres of public life comes to the forefront. In this connection, the analysis of the impact of socio-economic factors on the criminal situation in the regions of the Russian Federation is extremely topical. The research is based on the methods o作者: 無辜 時間: 2025-3-27 16:59 作者: Metastasis 時間: 2025-3-27 18:15 作者: 有抱負者 時間: 2025-3-27 22:27
A system based on the DMC8 microprocessor,rist organizations, criminal associations, and groups, as well as certain criminal elements, at the information and telecommunications infrastructures of industrialized countries. The chapter is devoted to one of the actual problems of modern society—the Internet as a crime zone. As a result of the 作者: GULLY 時間: 2025-3-28 04:54
https://doi.org/10.1007/978-3-030-87344-8ed using computer technology and the Internet. The purpose of this chapter is the analysis of crimes committed using the Internet and the elaboration of a system of measures to combat such crimes. The main directions for increasing the effectiveness of countering crimes committed using the Internet,作者: 糾纏 時間: 2025-3-28 08:53
Theodore George Rochow,Paul Arthur Tuckerevitably leads to a number of negative consequences associated with the misuse of innovative aids for the purpose of committing crimes. The emergence of new goods in the consumer market, in conjunction with the impersonal information aids for the implementation of their turnover, often exceeding the作者: 呼吸 時間: 2025-3-28 14:26 作者: 分發(fā) 時間: 2025-3-28 15:02 作者: Ledger 時間: 2025-3-28 18:55
https://doi.org/10.1007/978-3-030-92377-8 and terrorist activities and the process of their multi-level financing. In this regard, it is relevant not only to study the problems of countering extremist and terrorist activities but also to analyze the dependence of extremist and terrorist activities on their level of funding. The authors exa作者: Esalate 時間: 2025-3-29 02:13
Asya Pisarevskaya,Peter Scholtenon, the analysis of the possibilities of the application of the radio-electronic means during the information conflict is of scientific interest. The possibilities of applying modern radio-electronic aids in the course of information conflicts are considered and analyzed. Technological base of moder作者: 小溪 時間: 2025-3-29 06:29 作者: 我就不公正 時間: 2025-3-29 10:17 作者: vitrectomy 時間: 2025-3-29 14:52
Studies in Systems, Decision and Controlhttp://image.papertrans.cn/b/image/185736.jpg作者: famine 時間: 2025-3-29 17:44 作者: 古董 時間: 2025-3-29 19:56 作者: LATE 時間: 2025-3-30 00:54 作者: 大酒杯 時間: 2025-3-30 07:06
Implementation of the Law Enforcement Function of the State in the Field of Countering Crimes Commit including those related to the development of international cooperation in the criminal process, are proposed. The data obtained can be used for prevention and effective combatting crimes committed using the Internet.作者: exceptional 時間: 2025-3-30 09:52
Spectral Methods and Signal Analysistively small statistical data. It is proposed that a new approach to determine the probability of interesting events, with a limited general statistical sample, will allow to predict possible threats, with the greatest likelihood.作者: infelicitous 時間: 2025-3-30 14:34
Undergraduate Lecture Notes in Physicsndicators determines the criminality and its characteristics. Obviously, the models obtained by the authors do not pretend to exhaustively describe the numerical characteristics of criminality but are aimed at forming a methodological base for analyzing the criminal situation with the consideration of the social and economic situation.作者: Missile 時間: 2025-3-30 20:20 作者: DNR215 時間: 2025-3-30 23:50 作者: 開玩笑 時間: 2025-3-31 04:43