{"title":"Caught in the act","authors":"James D. Smiddy, Linda O. Smiddy","doi":"10.2307/j.ctv6mtf3b.11","DOIUrl":"https://doi.org/10.2307/j.ctv6mtf3b.11","url":null,"abstract":"If you really want to be smarter, reading can be one of the lots ways to evoke and realize. Many people who like reading will have more knowledge and experiences. Reading can be a way to gain information from economics, politics, science, fiction, literature, religion, and many others. As one of the part of book categories, caught in the act always becomes the most wanted book. Many people are absolutely searching for this book. It means that many love to read this kind of book.","PeriodicalId":221455,"journal":{"name":"Datamation archive","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117230949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"You know my name, look up the number","authors":"Robert E. Smith","doi":"10.5840/RENASCENCE201466418","DOIUrl":"https://doi.org/10.5840/RENASCENCE201466418","url":null,"abstract":"","PeriodicalId":221455,"journal":{"name":"Datamation archive","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130201354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hide and seek","authors":"W. D. Riley","doi":"10.2307/j.ctt6wrb0f.73","DOIUrl":"https://doi.org/10.2307/j.ctt6wrb0f.73","url":null,"abstract":"Ships use the Automatic Identification System (AIS) to identify and track other ships to avoid collisions and aid vessel traffic services. The system has vulnerabilities that could be exploited, which would have a negative impact on maritime safety. The best way to mitigate AIS vulnerabilities is to use more than one system to identify vessels. Using two systems makes anomalies more apparent that could indicate compromised systems. Secondary systems to use in conjunction with AIS include long-range identification and tracking and the authoritative vessel identification service.","PeriodicalId":221455,"journal":{"name":"Datamation archive","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116420229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}