Cybersecurity for children: an investigation into the application of social media

V Chang, L Golightly, QA Xu, T Boonmee… - Enterprise Information …, 2023 - Taylor & Francis
The paper discusses cybersecurity for children (particularly teenagers) and focuses on
Social Media's impact using a theoretical approach. Many social media users are unaware …

[HTML][HTML] IoT resource allocation and optimization based on heuristic algorithm

AK Sangaiah, AAR Hosseinabadi, MB Shareh… - Sensors, 2020 - mdpi.com
The Internet of Things (IoT) is a distributed system that connects everything via internet. IoT
infrastructure contains multiple resources and gateways. In such a system, the problem of …

Dynamics and convergence of hyper-networked evolutionary games with time delay in strategies☆

J Zhang, J Lou, J Qiu, J Lu - Information Sciences, 2021 - Elsevier
Networked evolutionary game theory is an important tool to study the emergence and
maintenance of cooperation in natural, social, and economical systems. In this paper, we …

Defense strategy selection model based on multistage evolutionary game theory

Y Liu, H Chen, H Zhang, X Liu - Security and Communication …, 2021 - Wiley Online Library
Evolutionary game theory is widely applied in network attack and defense. The existing
network attack and defense analysis methods based on evolutionary games adopt the …

[HTML][HTML] Security measures with enhanced behavior processing and footprint algorithm against sybil and bogus attacks in vehicular Ad Hoc network

K Stępień, A Poniszewska-Marańda - Sensors, 2021 - mdpi.com
Vehicular ad hoc networks (VANETs) are created according to the principles of ad hoc
mobile networks (MANETs), ie, spontaneous creation of a wireless network for vehicle-to …

[HTML][HTML] A self-learning detection method of Sybil attack based on LSTM for electric vehicles

YY Zhang, J Shang, X Chen, K Liang - Energies, 2020 - mdpi.com
Electric vehicles (EVs) are the development direction of new energy vehicles in the future.
As an important part of the Internet of things (IOT) communication network, the charging pile …

Traceability model based on improved witness mechanism

L Li, T Li - CAAI Transactions on Intelligence Technology, 2022 - Wiley Online Library
Traceability system is one of the popular applications of graphic blockchains. However,
there are centralisation problems and a long time for final consistency confirmation in the …

Humanode whitepaper: You are [not] a bot

D Kavazi, V Smirnov, S Shilina, MD Li… - arXiv preprint arXiv …, 2021 - arxiv.org
The advent of blockchain technology has led to a massive wave of different decentralized
ledger technology (DLT) solutions. Such projects as Bitcoin and Ethereum have shifted the …

Understanding the game behavior with sentiment and unequal status in cooperation network

M Liu, Y Ma, L Song, C Liu - Knowledge-Based Systems, 2021 - Elsevier
Cooperation network is one of the structural social relationships naturally formed in the
evolution of human societies. Previous research has focused on well-mixed structures, and …

Research and implementation of resource recovery supply chain financial platform based on blockchain technology

S Tang, Z Wang, S Ge, Y Ma… - … Conference on Computer …, 2022 - ieeexplore.ieee.org
Faced with the heavy utilization of the earth's limited resources and the limitation of waste
disposal capacity, implementing recycling is an effective method to improve resource …