..

応用および計算数学ジャーナル

原稿を提出する arrow_forward arrow_forward ..

MMORPG Data Recovery from Player to Player Interactions: Dead Acquisition Including Game Modification Files

Abstract

Kayla J Schneider

Imagine a world that allows for open, unmonitored communication, and the ability to trade currency between individuals anonymously. An environment such as this would present itself as a prime location for malicious intent. Money laundering, exploitation, theft, harassment, and stalking could potentially go unnoticed. When discussing World of warcraft or fortnite, malicious intent would generally not come to mind. However, this is precisely the type of environment that massively multiplayer online role-playing games provide.

免責事項: この要約は人工知能ツールを使用して翻訳されており、まだレビューまたは確認されていません

この記事をシェアする

インデックス付き

arrow_upward arrow_upward