This work is licensed under the Creative Commons Attribution 4.0 International License.
Liang, H. (2017). Optimization of party building model in colleges and universities based on multimedia intelligent platform. Boletin Tecnico/Technical Bulletin, 55(17), 569-575.Search in Google Scholar
Gayle, Kerr, Louise, & Kelly. (2017). Imc education and digital disruption. European Journal of Marketing.Search in Google Scholar
Karagul, B. I., Seker, M., & Aykut, C. (2021). Investigating students’ digital literacy levels during online education due to covid-19 pandemic. Sustainability, 13.Search in Google Scholar
Joanna Król, & Wojcik, T. G. (2017). The “ideological offensive” in education: the portrayal of the united states in secondary curricula and textbooks in poland during the stalinist period (1948–1956). Cold War History.Search in Google Scholar
Orgo, A., Bartol, T., Dolniar, D., & Podgornik, B. B. (2017). Attributes of digital natives as predictors of information literacy in higher education. British Journal of Educational Technology, 48(3).Search in Google Scholar
Wilder, S. (2019). Book review: big data in education: the digital future of learning, policy and practice:. Management Learning(3).Search in Google Scholar
Lu, Y., Tang, Z., Chai, X. L., Wang, M., & Song, S. (2022). A hierarchical protection scheme for intellectual property of semi-open source datasets based on double watermarking. Optik.Search in Google Scholar
Yang, Y., He, F., Han, S., Liang, Y., & Cheng, Y. (2021). A novel attribute-based encryption approach with integrity verification for cad assembly models. Engineering(5).Search in Google Scholar
Sun, L., & Gao, D. (2022). Security attitude prediction model of secret-related computer information system based on distributed parallel computing programming. Mathematical Problems in Engineering, 2022.Search in Google Scholar
Peng, Y., & Limin, Z. (2017). Hierarchical protection mechanism of network information based on computer security model algorithm terminal. Acta Technica CSAV (Ceskoslovensk Akademie Ved), 62(2), 341-350.Search in Google Scholar
Hsiao, T. C., Huang, Y. M., Chung, Y. F., Chen, T. L., & Chen, T. S. (2019). Efficient hierarchical key management scheme for vr/ar database systems. International Journal of Network Security, 21(4), 551-555.Search in Google Scholar
Gupta, I., & Singh, A. K. (2020). Guim-smd: guilty user identification model using summation matrix-based distribution. IET Information Security, 14(6), 773-782.Search in Google Scholar
Yin, H. L., Fu, Y., Li, C. L., Weng, C. X., Li, B. H., & Gu, J., et al. (2023). Experimental quantum secure network with digital signatures and encryption. National Science Review(4), 86-96.Search in Google Scholar
Wanjie, L. I., Zhang, X., Xiaohui, L. I., Cao, G., & Zhang, Q. (2019). Ppdp-pcao: an efficient high-dimensional data releasing method with differential privacy protection. IEEE Access, 7, 1-1.Search in Google Scholar
Xiaolei, Kang, Xinsheng, Ji, Kaizhi, & Huang, et al. (2017). Security-oriented distributed access selection for d2d underlaying cellular networks. Electronics Letters, 53(1), 32-34.Search in Google Scholar
Takefuji, Y. (2018). A blockchain is fragile against the database approach. Science.Search in Google Scholar
Aldaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cyb ersecurity e ducation. Computers & Security(119-), 119.Search in Google Scholar
Shin, J., You, I., & Seo, J. T. (2020). Investment priority analysis of ics information security resources in smart mobile iot network environment using the analytic hierarchy process. Mobile Information Systems, 2020(3), 1-11.Search in Google Scholar