Department of Computer Sciences, Carnegie Mellon University, Pittsburgh, United States
Research Article
MMORPG Data Recovery from Player to Player Interactions: Dead Acquisition Including Game Modification Files
Author(s): Kayla J Schneider*
Imagine a world that allows for open, unmonitored communication, and the ability to trade currency between individuals
anonymously. An environment such as this would present itself as a prime location for malicious intent. Money laundering,
exploitation, theft, harassment, and stalking could potentially go unnoticed. When discussing World of warcraft or fortnite, malicious
intent would generally not come to mind. However, this is precisely the type of environment that massively multiplayer online role-playing games provide... Read More»
DOI:
10.37421/2168-9679.22.11.476
Journal of Applied & Computational Mathematics received 1282 citations as per Google Scholar report