Author:Ralph Shad

Publications
EasyChair Preprint 14272
EasyChair Preprint 14271
EasyChair Preprint 14270
EasyChair Preprint 14269
EasyChair Preprint 14268
EasyChair Preprint 14267
EasyChair Preprint 14266
EasyChair Preprint 14265
EasyChair Preprint 14264
EasyChair Preprint 14163
EasyChair Preprint 14162
EasyChair Preprint 14160
EasyChair Preprint 14114
EasyChair Preprint 14111
EasyChair Preprint 14033
EasyChair Preprint 14032
EasyChair Preprint 14031
EasyChair Preprint 14023
EasyChair Preprint 14017
EasyChair Preprint 14016
EasyChair Preprint 14015
EasyChair Preprint 14014
EasyChair Preprint 13985

Keyphrases

Adversarial, AI-powered Threat Intelligence (AITI), Application of Artificial Intelligence, Archaeological Datasets, archaeological materials, Archaeological Site Prospection, archaeological sites, artifact provenance, Artificial Intelligence (AI), Attacks, behavior2, Blockchain, Business, consumer3, Critical Infrastructure, Cyber Threats, Cyberattacks, Cybersecurity3, Deciphering Ancient, decision making, Deepfakes, Detection and Mitigation, Development of digital tools, Digital approaches, Digital Archaeological Resources, digital archiving, Digitization, Economics, Engagement, Ethical and Legal Issues, Gamification Strategies, GIS, Green Consumerism, Integration of GIS, learning, machine, Malicious, Malware, Marketing3, Mitigation, monitoring, network, networks, neural, online artifacts and interactions, predictive modeling, public engagement, Ransomware, Rapid Documentation, Scripts and Languages, social, Social media archaeology, sophisticated, Standards for Long-Term Preservation, stratigraphic analysis, studies and authentication, Studying digital culture, Sustainable, Technology, Traffic, Use of Drones and Photogrammetry, visualization, Vulnerabilities, zero-day.