Analysis and Countermeasure Research about Sensitive Information of Complex Cyber Psychology of Cross-border Multi-ethnic Language

نویسندگان

  • Yingyu Yang
  • Bingze Li
  • Jiamei Wang
  • Changsen Yuan
  • Feng Liu
  • Gang Hu
  • Guangming Lu
  • Rui Lin
چکیده

In this paper, we consider all aspects of sensitive information of cyber psychology of cross-border multi-ethnic language, and use the method of combining the theoretical research and empirical research to carry out the analysis and countermeasure research about sensitive information of complex cyber psychology of cross-border multi-ethnic language in Yunnan province. It closely combined with the practical application and social needs and it also provide technical support and method guidance for sensitive information mining of complex cyber psychology of cross-border ethnic language. Due to China as a multi-ethnic multilingual country, so the development value, the demonstration value and the theory value of this topic is worth attention.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Validity and Reliability of the Persian Version of Cyber Pornography Use Inventory-9 Among Iranian Students

Background: This study aimed to examine the validity and reliability of the Persian version of cyber pornography use inventory-9 (CPUI-9) in the Iranian context.  Methods: The current research is a descriptive cross-sectional study. The study sample included 262 (190 male and 72 female) university students, who were selected by multi-stage cluster sampling method. The psychometric properties o...

متن کامل

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

Introducing a New Method for Multiarea Transmission Networks Loss Allocation

Transmission loss allocation in very large networks with multiple interconnected areas or countries is investigated in this paper. The main contribution is to propose a method to calculate the amount of losses due to activity of each participant in the multi area markets. Pricing of cross-border trades in Multi area systems is often difficult since individual countries may use incompatible ...

متن کامل

The Discursive Construction of Ethnic Identities: The Case of Greek-Cypriot Students

This study examines how Greek-Cypriot students aged 12 to 18, an understudied group of students, construct their ethnic identity in a complex setting such as Cyprus and what motivates the students in the selection of ethnic identity labels. The choice to focus on students aged 12-18 was made on the hypothesis that young children, who did not experience the 1974 war in Cyprus, may have a differe...

متن کامل

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016