| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910136401503321 |
|
|
Autore |
M Foster Olive |
|
|
Titolo |
Neuronal and glial structural plasticity induced by drugs of abuse / / edited by: M. Foster Olive and Justin Gass |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Frontiers Media SA, 2015 |
|
[Lausanne, Switzerland] : , : Frontiers Media SA, , 2015 |
|
©2015 |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (90 pages) : illustrations ( some colour); digital file(s) |
|
|
|
|
|
|
Collana |
|
Frontiers Research Topics |
Frontiers in Pharmacology |
|
|
|
|
|
|
|
|
Soggetti |
|
Brain - Effect of drugs on |
Neuroplasticity |
Neuropharmacology - Research |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Sommario/riassunto |
|
Drugs of abuse induce a host of alterations in brain structure and function, ranging from changes in gene expression and epigenetic processes to aberrant synaptic plasticity to volumetric changes in discrete brain regions. These alterations can be drug class-specific, and are not confined to neurons, as drugs of abuse also induce molecular and cellular alterations in various glial cell types such as astrocytes and microglia. This drug-induced "rewiring" of the brain at numerous levels can contribute to the development, maintenance, and persistence of the addicted state, as well as associated deficits in normal cognitive functioning. The aim of this Research Topic is to collect recent and important findings related to the structural alterations produced by drug of abuse in neurons, glial, and other cell types of the central nervous system. Suitable areas of analysis include but are not limited to: macrostructure of individual brain regions, dendritic branching and architecture, dendritic spine density and morphology, cell soma morphology, presynaptic terminal volume, astrocytic process length and branching, myelination, and microglial |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910797822003321 |
|
|
Titolo |
Automating open source intelligence : algorithms for OSINT / / edited by Robert Layton, Paul A. Watters |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Amsterdam : , : Elsevier, , [2016] |
|
©2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (212 pages) : illustrations, charts |
|
|
|
|
|
|
Collana |
|
Syngress advanced topics in information security |
|
|
|
|
|
|
Soggetti |
|
Open source intelligence |
Information technology - Social aspects |
Business intelligence - Computer network resources |
Intelligence service - Computer network resources |
Data mining |
Internet searching |
Computational intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Chapter 1 - The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 - Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 - Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization |
Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 - Enhancing Privacy to Defeat Open |
|
|
|
|
|
|
|
|
|
|
|
Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC |
Comparison to Existing ApproachConclusion and future work; References; Chapter 5 - Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 - Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report |
Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 - Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques |
Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 - Ethical Considerations When Using Online Datasets for Research Purposes; Introduction |
Existing Guidelines |
|
|
|
|
|
|
Sommario/riassunto |
|
Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data. Presents a coherent set of methods and processes for automating OSINTFocuses on algorithms and applications allowing the practitioner to get up and running quicklyIncludes fully developed case studies on the digital underground and predicting crime through OSINTDiscusses the ethical considerations when using publicly available online data |
|
|
|
|
|
|
|
| |