Author:Ralph ShadPublications |
---|
EasyChair Preprint 14272 | EasyChair Preprint 14271 | EasyChair Preprint 14270 | EasyChair Preprint 14269 | EasyChair Preprint 14268 | EasyChair Preprint 14267 | EasyChair Preprint 14266 | EasyChair Preprint 14265 | EasyChair Preprint 14264 | EasyChair Preprint 14163 | EasyChair Preprint 14162 | EasyChair Preprint 14160 | EasyChair Preprint 14114 | EasyChair Preprint 14111 | EasyChair Preprint 14033 | EasyChair Preprint 14032 | EasyChair Preprint 14031 | EasyChair Preprint 14023 | EasyChair Preprint 14017 | EasyChair Preprint 14016 | EasyChair Preprint 14015 | EasyChair Preprint 14014 | EasyChair Preprint 13985 |
KeyphrasesAdversarial, AI-powered Threat Intelligence (AITI), Application of Artificial Intelligence, Archaeological Datasets, archaeological materials, Archaeological Site Prospection, archaeological sites, artifact provenance, Artificial Intelligence (AI), Attacks, behavior2, Blockchain, Business, consumer3, Critical Infrastructure, Cyber Threats, Cyberattacks, Cybersecurity3, Deciphering Ancient, decision making, Deepfakes, Detection and Mitigation, Development of digital tools, Digital approaches, Digital Archaeological Resources, digital archiving, Digitization, Economics, Engagement, Ethical and Legal Issues, Gamification Strategies, GIS, Green Consumerism, Integration of GIS, learning, machine, Malicious, Malware, Marketing3, Mitigation, monitoring, network, networks, neural, online artifacts and interactions, predictive modeling, public engagement, Ransomware, Rapid Documentation, Scripts and Languages, social, Social media archaeology, sophisticated, Standards for Long-Term Preservation, stratigraphic analysis, studies and authentication, Studying digital culture, Sustainable, Technology, Traffic, Use of Drones and Photogrammetry, visualization, Vulnerabilities, zero-day. |
|