Pub Date : 2022-06-30DOI: 10.20533/ijcc.2046.3359.2022.0026
Tanvir Hassan Zoha, Sifat Nur Billah
{"title":"The Implications of State-sponsored Cyber Attacks in South Asian Countries","authors":"Tanvir Hassan Zoha, Sifat Nur Billah","doi":"10.20533/ijcc.2046.3359.2022.0026","DOIUrl":"https://doi.org/10.20533/ijcc.2046.3359.2022.0026","url":null,"abstract":"","PeriodicalId":341163,"journal":{"name":"International Journal of Chaotic Computing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115866301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.20533/ijcc.2046.3359.2022.0027
B. Baridam, E. Okike
{"title":"The Challenge of COVID-19 on the Information and Communication Technology Sector – Maximizing Misfortune","authors":"B. Baridam, E. Okike","doi":"10.20533/ijcc.2046.3359.2022.0027","DOIUrl":"https://doi.org/10.20533/ijcc.2046.3359.2022.0027","url":null,"abstract":"","PeriodicalId":341163,"journal":{"name":"International Journal of Chaotic Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127723604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-30DOI: 10.20533/ijcc.2046.3359.2022.0025
George B. Stone, Douglas A. Talbert, W. Eberle
{"title":"Utilizing Real-Time Strategy for Penetration Testing","authors":"George B. Stone, Douglas A. Talbert, W. Eberle","doi":"10.20533/ijcc.2046.3359.2022.0025","DOIUrl":"https://doi.org/10.20533/ijcc.2046.3359.2022.0025","url":null,"abstract":"","PeriodicalId":341163,"journal":{"name":"International Journal of Chaotic Computing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115422137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-30DOI: 10.20533/ijcc.2046.3359.2019.0019
R. Cottam, R. Vounckx
{"title":"Chaotic Computation for the Establishment of Unusual Hierarchies of Capability States","authors":"R. Cottam, R. Vounckx","doi":"10.20533/ijcc.2046.3359.2019.0019","DOIUrl":"https://doi.org/10.20533/ijcc.2046.3359.2019.0019","url":null,"abstract":"","PeriodicalId":341163,"journal":{"name":"International Journal of Chaotic Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133611808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-30DOI: 10.20533/ijcc.2046.3359.2019.0020
E. Rostampour
{"title":"Investigating Quantum Chaos in the (10,0) @ (18,0) Double-walled Carbon Nanotubes Using the Gaussian Unitary Ensemble and Some Distributions","authors":"E. Rostampour","doi":"10.20533/ijcc.2046.3359.2019.0020","DOIUrl":"https://doi.org/10.20533/ijcc.2046.3359.2019.0020","url":null,"abstract":"","PeriodicalId":341163,"journal":{"name":"International Journal of Chaotic Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130202406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-30DOI: 10.20533/IJCC.2046.3359.2019.0018
Luciene Cristina Alves Rinaldi, A. Einsfeldt
{"title":"Recommendation System for Social Network Analysis Based on the Observed Behaviors","authors":"Luciene Cristina Alves Rinaldi, A. Einsfeldt","doi":"10.20533/IJCC.2046.3359.2019.0018","DOIUrl":"https://doi.org/10.20533/IJCC.2046.3359.2019.0018","url":null,"abstract":"","PeriodicalId":341163,"journal":{"name":"International Journal of Chaotic Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121727436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}