Academic literature on the topic 'Cyber Extension'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber Extension.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber Extension"

1

Padmaningrum, Dwiningtyas, La Mani, Triya Ayu Retnaningtyas, Tri Sujatmiko, Subejo Subejo, and Emi Widiyanti. "A PERSPECTIVE OF TECHNOLOGY ACCEPTANCE MODEL ON THE AGRICULTURE EXTENSION STAFFS USING CYBER EXTENSION." Agrisocionomics: Jurnal Sosial Ekonomi Pertanian 8, no. 3 (2024): 637–56. http://dx.doi.org/10.14710/agrisocionomics.v8i3.23820.

Full text
Abstract:
Cyber extension web facilitates agriculture extension staffs to leverage this media communication system to strengthen their capability and capacity for improving extension services. Through the Technology Acceptance Model approach, this study examines the use of cyber extension and the affect of self-efficacy, perceived usefulness, perceived ease of use, subjective norms, and attitude toward usage on cyber extension usage by agriculture extension staffs in Central Java Province. This study was conducted from April to May 2023 using a quantitative approach. The population includes agriculture
APA, Harvard, Vancouver, ISO, and other styles
2

Osad Imron Rosadi, Hepi Hapsari, and Lucyana Trimo. "Agricultural extension workers' perception of cyber extension." International Journal of Frontiers in Life Science Research 8, no. 1 (2025): 005–19. https://doi.org/10.53294/ijflsr.2025.8.1.0043.

Full text
Abstract:
Mastery of various information system technologies in the agricultural sector greatly supports the competence of agricultural extension agents. Extension agents must possess adequate competencies before conducting extension activities, education, or training for farmers to strengthen farmers' perceptions of technological innovation. This study aims to: (a) analyze the perceptions of extension agents toward Cyber Extension; (b) analyze the personal characteristics, motivation, and independence of agricultural extension agents in West Bandung Regency; and (c) analyze the partial and simultaneous
APA, Harvard, Vancouver, ISO, and other styles
3

Sabir, Sabir, Sugiyanto Sugiyanto, Keppi Sukesi, and Yayuk Yuliati. "The Performance of Agricultural Extension Workers in Utilizing Cyber Extension in Malang Raya Region." Journal of Socioeconomics and Development 1, no. 2 (2018): 113. http://dx.doi.org/10.31328/jsed.v1i2.772.

Full text
Abstract:
Cyber extension is a system of agricultural extension information through the internet media to support the provision of extension materials and agricultural information for extension workers. The existence of cyber extension is expected to support the performance of agricultural extension workers. This study aims to describe the implementation of cyber extension, describe the extension worker in the utilization of cyber extension and formulate the improvement efforts of extension worker in cyber extension in Malang Raya area. The research method used a combination of quantitative and qualitat
APA, Harvard, Vancouver, ISO, and other styles
4

Adriyani, Fauziah Yulia. "Pemanfaatan Cyber Extension sebagai Media Diseminasi Inovasi Pertanian oleh Penyuluh Pertanian di Provinsi Lampung." Suluh Pembangunan : Journal of Extension and Development 1, no. 1 (2019): 1–7. http://dx.doi.org/10.23960/jsp.v1i1.5.

Full text
Abstract:
Cyber extension diluncurkan Kementerian Pertanian sebagai media yang dapat dimanfaatkan penyuluh baik pusat dan daerah untuk mendiseminasikan inovasi teknologi pertanian sekaligus wadah pengumpulan angka kredit. Dalam perkembangannya sejak 2010 sampai saat ini, pemanfaatan cyber extension masih rendah baik mencari maupun menyebarluaskan informasi. Penelitian ini bertujuan untuk mengetahui keragaan pemanfaatan cyber extension oleh penyuluh untuk menyebarluaskan informasi serta menganalisis kendala peningkatan pemanfaatan cyber extension sebagai media diseminasi inovasi pertanian di Provinsi Lam
APA, Harvard, Vancouver, ISO, and other styles
5

Managanta, Andri Amaliel, Rinaldi Wengkau, and Meitry Tambingsila. "Efektivitas Website Cyber Extension Sebagai Media Komunikasi dan Informasi Penyuluh." Jurnal Penyuluhan Pertanian 19, no. 1 (2024): 53–62. http://dx.doi.org/10.51852/jpp.v19i1.771.

Full text
Abstract:
Penyuluh berperan penting dalam pembangunan sektor pertanian di Indonesia, dan keberhasilan pertanian ditentukan pada peran penyuluh. Cyber extension hadir sebagai salah satu media untuk menyebarkan teknologi pertanian. Kementerian Pertanian telah menghadirkan cyber extension sebagai sarana bagi penyuluh di tingkat pusat maupun daerah. Penelitian bertujuan untuk menganalisis faktor-faktor yang berpengaruh terhadap efektivitas website cyber extension sebagai alat komunikasi dan sumber informasi bagi penyuluh di Kabupaten Poso. Penelitian dilakukan bulan Mei hingga Desember 2020, melibatkan lima
APA, Harvard, Vancouver, ISO, and other styles
6

Ulin Nihayah, Niha. "EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG." Jurnal Bimas Islam 13, no. 2 (2020): 404–34. http://dx.doi.org/10.37302/jbi.v13i2.256.

Full text
Abstract:
Abstrak 
 Artikel ini menyajikan hasil pelaksanaan cyber extension yang dilaksanakan oleh penyuluh agama Kota Semarang, serta efektifitas dari pelaksanaannya. Cyber extension merupakan inovasi sistem informasi dan teknologi informasi dengan berbasis cyber sebagai media dalam rangka penyuluhan untuk memudahkan kinerja penyuluh. Kajian ini bertujuan untuk mengetahui efektifitas dari pelaksanaan cyber extension penyuluh Agama Kota Semarang, terkait dengan peluang dan tantangan dalam pelaksanaan cyber extension yang dilakukan. Metode yang dilakukan penulis adalah dengan menggunakan penelitian
APA, Harvard, Vancouver, ISO, and other styles
7

Fadillah, Nurul, Dwiningtyas Padmaningrum, and Eksa Rusdiyana. "Faktor-Faktor yang Memengaruhi Pemanfaatan Cyber Extension oleh Penyuluh Pertanian Lapangan (PPL) di Kabupaten Bima." AGRITEXTS: Journal of Agricultural Extension 47, no. 1 (2024): 37. http://dx.doi.org/10.20961/agritexts.v47i1.86723.

Full text
Abstract:
<p><em>Cyber extension is a website-based application that provides information related to agriculture. Field agricultural extension workers (PPL) in Bima Regency still have not optimized the cyber extension function to share information. This research aims to analyze the influence of PPL and cyber extension innovation characteristics on the use of cyber extension by PPL in Bima Regency. This research uses a quantitative approach, and data analysis uses multiple linear regression tests. The research results show that age (X<sub>1</sub>) and formal education (X<sub&gt
APA, Harvard, Vancouver, ISO, and other styles
8

Pakpahan, Tience E., Amelia Zuliyanti Siregar, and Theresia Inova Sitanggang. "Pemanfaatan Cyber Extension oleh Penyuluh Pertanian dalam Meningkatkan Kinerja Penyuluh Pertanian di Kabupaten Deli Serdang." Paradigma Agribisnis 5, no. 2 (2023): 138. http://dx.doi.org/10.33603/jpa.v5i2.7485.

Full text
Abstract:
Cyber Extension, aplikasi yang diluncurkan Kementrian Pertanian sejak tahun 2010 hingga kini, sehingga dapat meningkatkan kinerja penyuluh pertanian. Pengkajian bertujuan mengetahui tingkat pemanfaatan Cyber Extension oleh penyuluh pertanian dalam meningkatkan kinerja penyuluh pertanian di Kabupaten Deli Serdang. Pengkajian menggunakan metode deskriptif dan kuisioner. Pelaksanaan pengkajian di Kabupaten Deli Serdang Provinsi Sumatera Utara, pemilihan lokasi dilakukan secara sengaja dengan alasan tertentu. Sampel ditentukan dengan metode proportional random sampling sebanyak 55 responden dari
APA, Harvard, Vancouver, ISO, and other styles
9

Latarus, Fangohoi, Sugiyanto, Sukesi Keppi, and Dwi Cahyono Edi. "THE ROLE OF CYBER EXTENSION AS MEDIA INFORMATION OF PLANTATION GENETIC RESOURCES IN THE INSURANCE OF COCOA RESULTS IN SOUTH MANOKWARI REGENCY WEST PAPUA." International Journal of Research - Granthaalayah 5, no. 11 (2017): 343–50. https://doi.org/10.5281/zenodo.1117179.

Full text
Abstract:
This study aims to determine the benefits of cyber extension as a source of information on plant genetic resources in the availability of cocoa yields and the level of information adoption for farmers. The method used in this research is descriptive analysis method. Determination of research location by purposive sampling that is expansion areas that yield cocoa fruit. Census data retrieval method, using face to face technique. Extension Implementation in using cyber extension media especially on the utilization of mobile phone and Internet media in obtaining information. It also provides posi
APA, Harvard, Vancouver, ISO, and other styles
10

Amin, Muh. "EFEKTIVITAS DAN PERILAKU PETANI DALAM MEMANFAATKAN TEKNOLOGI INFORMASI BERBASIS CYBER EXTENSION." Informatika Pertanian 23, no. 2 (2016): 211. http://dx.doi.org/10.21082/ip.v23n2.2014.p211-219.

Full text
Abstract:
Information technology based on cyber extension is one of agricultural communication tools to achieve farmers welfare. Cyber extension is a technology innovation to accelerate communication of agricultural information to the user , so that information can be obtained more quickly, precisely and relevant to farmer demands.The study aimed to analyze the effectiveness and behavior of farmers in using cyber extension as a medium of communication and information in support of agricultural development. The study method was survey with 86 farmer as sample respondents. The data were analyzed descripti
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber Extension"

1

Maines, C. L. "A framework for the extension and visualisation of cyber security requirements in modelling languages." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/8393/.

Full text
Abstract:
Almost half of UK firms claim to have been subject to some sort of cyber-attack or breach in the last 12 months, with an average cost per incident being around £20,000. Yet, even in the face of these ever-mounting threats, cyber security is still treated as an afterthought throughout the systems development lifecycle (SDLC). Though literature is aiming to rectify this mindset through the proposal of multiple software security solutions, there is still a noticeable absence of any usable, expressive tool for designing cyber security into a system at the requirements stages of the SDLC. By not pr
APA, Harvard, Vancouver, ISO, and other styles
2

Turgeman, Yaniv Jacob. "Microbial mediations : cyber-biological extensions of human sensitivity to natural and made ecologies." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99304.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Architecture, 2015.<br>Thesis: S.M., Massachusetts Institute of Technology, Department of Civil and Environmental Engineering, 2015.<br>Cataloged from PDF version of thesis. Title as it appears in MIT Commencement Exercises program, June 5, 2015: Designing for sensitivity.<br>Includes bibliographical references (pages 129-139).<br>As natural and human made environments become increasingly monitored and modulated by embedded digital technologies, we are presented with a staggering flow of information reverberating between the sc
APA, Harvard, Vancouver, ISO, and other styles
3

Oliveira, Ahmina Raiara Solsona. "O comprometimento asiático com o desenvolvimento cibernético da região e a utilização sínica do ciberespaço como extensão de sua estratégia tradicional." Universidade Estadual da Paraíba, 2015. http://tede.bc.uepb.edu.br/tede/jspui/handle/tede/2572.

Full text
Abstract:
Submitted by Elesbão Santiago Neto (neto10uepb@cche.uepb.edu.br) on 2016-09-14T19:04:50Z No. of bitstreams: 1 PDF - Ahmina Raiara Solsona Oliveira.pdf: 1607697 bytes, checksum: 4d8736991ad9325076c18ee09c304683 (MD5)<br>Made available in DSpace on 2016-09-14T19:04:50Z (GMT). No. of bitstreams: 1 PDF - Ahmina Raiara Solsona Oliveira.pdf: 1607697 bytes, checksum: 4d8736991ad9325076c18ee09c304683 (MD5) Previous issue date: 2015-06-01<br>CAPES<br>The Asian presence is constant in cyber conflicts and theses countries are appearing as victims or alleged perpetrators. The high rate of participation
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Yi-Hong, and 陳奕宏. "Utilizing Random Forest and Extension Neural Network to Improve Yield and Fault Diagnosis in Cyber Physical System: Two Empirical Studies." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/b7sh45.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyber Extension"

1

Sumardjo. Cyber extension: Peluang dan tantangannya dalam revitalisasi penyuluhan pertanian. IPB Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jena, Dr Anshuman, and Dr Subhaprada Dash, eds. Current Trends in Cyber Extension. AkiNik Publications, 2022. http://dx.doi.org/10.22271/ed.book.1801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cheng, Dean. Cyber Dragon. ABC-CLIO, LLC, 2016. http://dx.doi.org/10.5040/9798400636431.

Full text
Abstract:
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the “what” but also addressing the “why” behind China's focus on establishing information dominance as a key component of its military efforts. China combines financial firepower—currently the world's second largest economy—with a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes ex
APA, Harvard, Vancouver, ISO, and other styles
4

Falco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.

Full text
Abstract:
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital a
APA, Harvard, Vancouver, ISO, and other styles
5

WEBB, Smart. Updated Cyber Security for Beginners: An Extensive Beginner to Expert Guide to Learning and Mastering How to Protect Your System Against Threats, Hacks and Cyber Attacks. Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dieter, Fleck, ed. The Handbook of International Humanitarian Law. 4th ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198847960.001.0001.

Full text
Abstract:
This updated and revised fourth edition sets out a Black Letter text of international humanitarian law accompanied by case analysis and extensive explanatory commentary. The book takes account of recent legal developments, such as the 2017 Nuclear Weapons Prohibition Treaty, as well as the ongoing debate on many old and new issues including the notion of direct participation in hostilities; air and missile warfare; military operations in outer space; military cyber operations; belligerent occupation; operational detention; and the protection of the environment in relation to armed conflict. Th
APA, Harvard, Vancouver, ISO, and other styles
7

Mockaitis, Thomas R. Violent Extremists. ABC-CLIO, LLC, 2019. http://dx.doi.org/10.5040/9798216032472.

Full text
Abstract:
Written for the general reader as well as the professional, this succinct but comprehensive work examines the hybrid nature of the two violent extremist movements threatening the United States: Islamist extremism and white nationalism. Scholarship as well as popular discourse on terrorism often focuses disproportionately on specific groups without paying sufficient attention to the ideology that motivates them. This book emphasizes understanding and countering the ideology that fuels extremism over preoccupation with specific organizations such as Al Qaeda or ISIS. It sets contemporary terrori
APA, Harvard, Vancouver, ISO, and other styles
8

Roscini, Marco. International Law and the Principle of Non-Intervention. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/oso/9780198786894.001.0001.

Full text
Abstract:
Abstract The principle of non-intervention in the domestic affairs of states is one of the most venerable principles of international law but the determination of its exact content has remained an enigma that has haunted generations of international lawyers. This book solves this problem and identifies what the principle of non-intervention specifically prohibits, and what it does not. The principle in question is strictly linked to some fundamental notions of international law, such as sovereignty, use of force, and self-determination: its study, therefore, is of great significance as it offe
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cyber Extension"

1

Yan, Chuyi, Haixia Xu, Yongheng Mu, and Jiong Ding. "Pitch in: A Secure Extension Signature Based on SM9." In Science of Cyber Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17551-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hamidi, Amirreza, and Hossein Ghodosi. "Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT." In Science of Cyber Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17551-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ren, Mengxia, Joshua Josey, and Chuan Yue. "WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies." In Science of Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45933-7_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krumnow, Arne, Swantje Plambeck, and Goerschwin Fey. "Using Forest Structures for Passive Automata Learning." In Machine Learning for Cyber-Physical Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-47062-2_7.

Full text
Abstract:
AbstractWe present an extension on a passive learning algorithm for deterministic finite automata (DFAs) and Mealy machines which is based on the regular positive and negative inference (RPNI) algorithm. The extension builds a structure which is inspired by random forests. Instead of building a single automaton, the forest builds several. The paper introduces two forest structures for learning DFAs, together with their respective extension for Mealy machines, where the choice of which to pick depends on the output to achieve, as well as the type of application. Following that, the empirical analysis shows which parameters yield better results than the basic RPNI passive learning approach. In our experiments, forest structures for passive learning of automata yield significant improvement over the standard RPNI algorithm of up to $$43\%$$ 43 % in the total number of correct outputs when testing Mealy machines.
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Manpreet Pal, Sumati Sidharth, and Shobhanam Krishna. "Process Mapping Military Aircraft Life Extension and Cyber Security Issues." In Attacks on Artificial Intelligence. Apple Academic Press, 2025. https://doi.org/10.1201/9781003498827-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Wonseok, Jaehwan Jeong, Seonghyeon Park, and Chang-Gun Lee. "Practical Multicore Extension of Functionally and Temporally Correct Real-Time Simulation for Automotive Systems." In Cyber Physical Systems. Model-Based Design. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41131-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Utkin, Lev, and Andrei Konstantinov. "An Extension of the Neural Additive Model for Uncertainty Explanation of Machine Learning Survival Models." In Cyber-Physical Systems: Intelligent Models and Algorithms. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95116-0_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Jun, and Shibo Luo. "Novel Lifetime Extension Technology for Cyber-Physical Systems Using SDN and NFV." In Energy Conservation in Residential, Commercial, and Industrial Facilities. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119422099.ch10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chergui, Mohamed El Amine, and Sidi Mohamed Benslimane. "A Valid BPMN Extension for Supporting Security Requirements Based on Cyber Security Ontology." In Model and Data Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00856-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sirajuddin, Arief, Tuti Bahfiarti, Andi Alimuddin Unde, and Sudirman Karnay. "Developing Farmer Capacity and Performance Through Cyber Extension: A Review of Digital Governance." In Atlantis Highlights in Social Sciences, Education and Humanities. Atlantis Press International BV, 2025. https://doi.org/10.2991/978-94-6463-680-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber Extension"

1

Sindhu, K. S. V., M. Maheswari, and D. Ramalakshmi. "CYBER WEB: An Extension for Scanning Websites." In 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN). IEEE, 2023. http://dx.doi.org/10.1109/vitecon58111.2023.10157088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ma, Xiongtao, Chongming Bao, Lei Li, Lihua Zhou, and Bing Kong. "An Extension to Hub Algorithm Based on Triangular Loop." In 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2014. http://dx.doi.org/10.1109/cyberc.2014.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yunus, U., M. Rizkiansyah, and A. Ariestyani. "Cyber extension as the sustainable communication for farmers." In 1ST INTERNATIONAL CONFERENCE ON ACHIEVING THE SUSTAINABLE DEVELOPMENT GOALS. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0110070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Graja, Imen, Slim Kallel, Nawal Guermouche, and Ahmed Hadj Kacem. "BPMN4CPS: A BPMN Extension for Modeling Cyber-Physical Systems." In 2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). IEEE, 2016. http://dx.doi.org/10.1109/wetice.2016.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Falcon, Pablo, Antonio Barreiro, Miguel D. Cacho, and Emma Delgado. "Passive teleoperation of mobile robot with input-output linearization and dynamic extension." In 2014 IEEE 4th Annual International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2014. http://dx.doi.org/10.1109/cyber.2014.6917517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xiong, Wenjun, and Robert Lagerstrom. "Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang." In 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2019. http://dx.doi.org/10.1109/cybersa.2019.8899615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Junsong, Yang Wang, Yiran Wang, and Bingrui Zhao. "Human behavior data extension method for mine scene." In 2023 International Conference on Cyber-Physical Social Intelligence (ICCSI). IEEE, 2023. http://dx.doi.org/10.1109/iccsi58851.2023.10303787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yuxia, Sun, and Yang Pengying. "An algorithm of compiling instruction list into the ladder diagram base on the block extension." In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2012. http://dx.doi.org/10.1109/cyber.2012.6320079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Agbaje, Micheal, Oludele Awodele, and Chibueze Ogbonna. "Applications of Digital Watermarking to Cyber Security (Cyber Watermarking)." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2138.

Full text
Abstract:
Cyber security is generally an extension of the traditional information technology (IT) security that is aimed at protecting systems, applications and data that exposed to a variety of forms of attack via the internet, ranging from data theft and espionage to corruption of data and denial of service attacks. There is a need for an increase in cyber security research due to losses from sabotage being experienced by nations, businesses and individuals from various cybercrime attacks. This paper takes a look at the applications digital watermarking to the process of protection in cyber space call
APA, Harvard, Vancouver, ISO, and other styles
10

Rentschler, Markus, Henning Trsek, and Lars Durkop. "OPC UA extension for IP auto-configuration in cyber-physical systems." In 2016 IEEE 14th International Conference on Industrial Informatics (INDIN). IEEE, 2016. http://dx.doi.org/10.1109/indin.2016.7819128.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyber Extension"

1

Yilmaz, Ihsan, and Kenes Bulent. Digital Authoritarianism in Turkish Cyberspace: A Study of Deception and Disinformation by the AKP Regime’s AKtrolls and AKbots. Populism & Politics (P&P), 2023. http://dx.doi.org/10.55271/pp0026.

Full text
Abstract:
This article explores the evolving landscape of digital authoritarianism in Turkish cyberspace, focusing on the deceptive strategies employed by the AKP regime through AKtrolls, AKbots and hackers. Initially employing censorship and content filtering, the government has progressively embraced sophisticated methods, including the weaponization of legislation and regulatory bodies to curtail online freedoms. In the third generation of information controls, a sovereign national cyber-zone marked by extensive surveillance practices has emerged. Targeted persecution of critical netizens, coupled wi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!