01416cam0 2200325 450 E60020002299220170614145101.0883873240X20061121d2005 |||||ita|0103 baitaIT<<Il >>nuovo diritto d'autorela tutela della proprietà intellettuale nella società dell'informazioneaggiornato alla riforma del diritto d'autore (L.31 marzo 2005, n.43) e al codice dei diritti della proprietà industriale (D.Lgs.10 febbraio 2005, n.30)Andrea Sirotti Gaudenziintroduzione di Patrizio Menchetti3 ed.RiminiMaggioli2005409 p.24 cm1 CD-ROM<I >prontuari giuridici001LAEC000185602001 I *prontuari giuridiciSirotti Gaudenzi, AndreaAF00022690070263056Menchetti, PatrizioA600200039335070ITUNISOB20170614RICAUNISOBUNISOB340132103UNISOB340|CD132103.E600200022992M 102 Monografia moderna SBNM340005524SI132103acquistopomicinoUNISOBUNISOB20061121084252.020161123084858.0catenacci340|CD000125CON132103.acquistopomicinoUNISOBUNISOB20061121090331.020141209130936.0rovitoNuovo diritto d'autore66574UNISOB05576nam 22007455 450 991100746010332120250524130232.03-031-89363-810.1007/978-3-031-89363-6(CKB)39124576900041(DE-He213)978-3-031-89363-6(MiAaPQ)EBC32130307(Au-PeEL)EBL32130307(EXLCZ)993912457690004120250524d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierDigital Forensics and Cyber Crime 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9–10, 2024, Proceedings, Part I /edited by Sanjay Goel, Ersin Uzun, Mengjun Xie, Sumantra Sarkar1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (XVII, 357 p. 121 illus., 102 illus. in color.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;6133-031-89362-X -- Artificial Intelligence & Security. -- Hacking Mobile Biometrics with the Photograph of a Fingerprint. -- Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling. -- Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review. -- CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning. -- Multimedia Forensics. -- Toward Forensic-Friendly AI: Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness. -- The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router. -- ENF Match with Masking: a new method for searching with sparse signal. -- Lightweight Multi-Tier IDS for UAV Networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence. -- Intrusion Detection. -- Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model. -- APTChaser: Cyber Threat Attribution via Attack Technique Modeling. -- What Do We Know About the Psychology of Insider Threats?. -- A Digital Profiling Triage Model for Industrial Espionage. -- Intrusion and Fraud Detection. -- Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning. -- Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture. -- ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning. -- Large Language Models, Advances in Security and Forensics. -- Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails. -- SecureSem: Sensitive Text Classification based on Semantic Feature Optimization. -- The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI. -- Advances in Security and Forensics. -- Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review. -- Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project.The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9–10, 2024. The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics. Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;613Data protectionApplication softwareComputer systemsComputer networksSoftware engineeringOperating systems (Computers)Data and Information SecurityComputer and Information Systems ApplicationsComputer System ImplementationComputer Communication NetworksSoftware EngineeringOperating SystemsData protection.Application software.Computer systems.Computer networks.Software engineering.Operating systems (Computers)Data and Information Security.Computer and Information Systems Applications.Computer System Implementation.Computer Communication Networks.Software Engineering.Operating Systems.005.8Goel Sanjayedthttp://id.loc.gov/vocabulary/relators/edtUzun Ersinedthttp://id.loc.gov/vocabulary/relators/edtXie Mengjunedthttp://id.loc.gov/vocabulary/relators/edtSarkar Sumantraedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9911007460103321Digital Forensics and Cyber Crime2022607UNINA01521nam0 22003131i 450 SBL030251020251003044351.0IT837063 20110901d1981 ||||0itac50 baitaitz01i xxxe z01nz01ncRDAcarrierLe stagioni della solidarietacronache di don Lorenzo Guetti tratte dal Bollettino di Trento del Consiglio provinciale d'agricoltura dal 1885 al 1893letture e note per l'utilizzazione didattica di Mauro Nerinote e schede di documentazione di Luciano Imperadoriintroduzione di Carlo Leonardelliillustrazioni di Carlo Sartorio2. ed.TrentoIl quadrifoglio1981142 p.ill.21 cm .Guetti, LorenzoCFIV117170070791171Neri, Mauro <1950- >CFIV015896Imperadori, LucianoCFIV107845ITIT-00000020110901IT-BN0095 NAP 01POZZO LIB.Vi sono collocati fondi di economia, periodici di ingegneria e scienze, periodici di economia e statistica e altri fondi comprendenti documenti di economia pervenuti in dono. SBL0302510Biblioteca Centralizzata di Ateneo1 v. 01POZZO LIB.ECON MON 4106 0101 0000151755E VMA 1 v.B 2021031620210316 01Stagioni della solidarieta1768282UNISANNIO