Author:
Fang BinXing,Guo YunChuan,Zhou Yuan
Publisher
Springer Science and Business Media LLC
Reference20 articles.
1. Stanton J J. Terror in cyberspace: terrorists will exploit and widen the gap between governing structures and the public. Am Behav Sci, 2002, 45: 1017–1032
2. Goth G. Terror on the Internet: a complex issue, and getting harder. IEEE Distrib Syst Online, 2008, 9: 3–3
3. Volokh E. Freedom of speech, shielding children, and transcending balancing. Supreme Court Rev, 1997, 31: 141–197
4. Zhang X Y. Communication decency act: America’s control model of erotic website (in Chinese). J Soc Sci, 2006, 8: 136–143
5. Lee P Y, Hui S C, Fong A C M. Neural networks for web content filtering. IEEE Intel Syst, 2002, 17: 48–57
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献