01040nam a2200277 i 450099100046899970753620020503181402.0970919s1990 it ita 8815027548b10082165-39ule_instLE02516632ExLFac. Economiaita333.7Il declino degli elementi :ambiente naturale e rigenerazione delle risorse nell'Europa moderna /a cura di Alberto Caracciolo e Gabriella BonacchiBologna :Il mulino,c1990264 p. ;22 cmTemi e discussioni EuropaRisorse naturaliCaracciolo, AlbertoBonacchi, Gabriella.b1008216507-06-1827-06-02991000468999707536LE025 ECO 333.7 CAR01.0112025000032194le025Catalogato 2018-E0.00-l- 00000.i1009370927-06-02Declino degli elementi614894UNISALENTOle02501-01-97ma -itait 3106664nam 2200721 450 991081790860332120230315230538.00-12-802917-X(CKB)3710000000527189(EBL)4186519(Au-PeEL)EBL4186519(CaPaEBR)ebr11134709(CaONFJC)MIL877811(OCoLC)932340309(MiAaPQ)EBC4186519(PPN)193662868(EXLCZ)99371000000052718920160102h20162016 uy| 0engur|n#||||||||rdacontentrdacontentrdamediardacarrierAutomating open source intelligence algorithms for OSINT /edited by Robert Layton, Paul A. WattersAmsterdam :Elsevier,[2016]©20161 online resource (212 pages) illustrations, chartsSyngress advanced topics in information securityDescription based upon print version of record.0-12-802916-1 Includes bibliographical references and index.Chapter 1 - The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 - Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 - Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in AnonymizationAttribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 - Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMCComparison to Existing ApproachConclusion and future work; References; Chapter 5 - Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 - Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency ReportMainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 - Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation TechniquesGraph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 - Ethical Considerations When Using Online Datasets for Research Purposes; IntroductionExisting GuidelinesAlgorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data. Presents a coherent set of methods and processes for automating OSINTFocuses on algorithms and applications allowing the practitioner to get up and running quicklyIncludes fully developed case studies on the digital underground and predicting crime through OSINTDiscusses the ethical considerations when using publicly available online dataSyngress advanced topics in information securityOpen source intelligenceInformation technologySocial aspectsBusiness intelligenceComputer network resourcesIntelligence serviceComputer network resourcesData miningInternet searchingComputational intelligenceOpen source intelligence.Information technologySocial aspects.Business intelligenceComputer network resources.Intelligence serviceComputer network resources.Data mining.Internet searching.Computational intelligence.Layton Robert1986-Watters Paul A.MiAaPQMiAaPQMiAaPQBOOK9910817908603321Automating open source intelligence3915743UNINA04977nam 2200733 a 450 991096627650332120240514053946.01-283-33083-0978661333083390-272-7895-4(CKB)2550000000063895(EBL)799810(OCoLC)773746716(SSID)ssj0000555481(PQKBManifestationID)11386060(PQKBTitleCode)TC0000555481(PQKBWorkID)10519515(PQKB)11399901(MiAaPQ)EBC799810(Au-PeEL)EBL799810(CaPaEBR)ebr10513331(DE-B1597)719325(DE-B1597)9789027278951(EXLCZ)99255000000006389519861009d1987 uy 0engur|n|---|||||txtrdacontentcrdamediacrrdacarrierSentential complementation in Spanish a lexico-grammatical study of three classes of verbs /Carlos Subirats-Rüggeberg1st ed.Amsterdam :John Benjamins Pub. Co.,1987.1 online resource (302 pages)Lingvisticæ investigationes. Supplementa,0165-7569 ;v. 14Description based upon print version of record.90-272-3123-0 Includes bibliographical references and index.SENTENTIAL COMPLEMENTATION IN SPANISH; Editorial page; Title page; Copyright page; Dedication; Acknowledgements; Table of contents; 1. INTRODUCTION; 1.1. Preliminaries; 1.2. Nominal value of the sentential complement; 1.3. The contribution of traditional Spanish grammar towards the study of sentential complementation; 1.4. Of novelty and obsolescence in Spanish generativism: with regard to a failed attempt to formulate the rule of «Equi»; 2. CLASS 4 VERBS WITH A SUBJECT COMPLEMENT AND AN INDIRECT OBJECT; 2.1. Classification; 2.2. Distributional properties; 2.2.1. Active and non-active subject2.2.2.elhecho de Qu S 2.2.3. Sentential complement in the subjunctive and the indicative; 2.3. Transformational properties; 2.3.1. Pronominalization of the sentential complement; 2.3.2. Reduction of the sentential complement; 2.3.3. Restructuring of the sentential complement; 2.3.4. Passive; 2.3.4.1. Se passive; 2.3.4.2. Se-de passive and Estar-de passive; 2.3.5 Permutation; 2.3.6. Objects referring to parts of the body; 2.4. Adjectival and nominal derivatives; NOTES; 3. CLASS 5 VERBS WITH A SUBJECT COMPLEMENT, WITH OR WITHOUT AN OBJECT; 3.1. Classification; 3.2. Distributional properties3.2.1. Active and non-active subject 3.2.2. el hecho de Qu S; 3.2.3. que S and que Ssubj; 3.3. Transformational properties; 3.3.1. Reduction of the sentential complement; 3.3.1.1. Reduction with subject deletion; 3.3.1.2. Reduction without subject deletion or Subject raising; 3.3.2. Extraction; 3.3.3. Restructuring of the subject complement; 3.3.4. Passive; 3.3.5. Middle se; 3.3.6. Permutation; NOTES; 4. CLASS 6 VERBS WITH A DIRECT OBJECT SENTENTIAL COMPLEMENT; 4.1. Classification; 4.2. Distributional properties; 4.2.1. Active and non-active subject; 4.2.2. Det Ncomp de Qu S4.2.3. que S and que Ssubj 4.2.4. si S o si S sentential complement; 4.3. Transformational properties; 4.3.1. Pronominalization of the sentential complement; 4.3.2. Reduction of the sentential complement; 4.3.2.1. Reduction with subject deletion; 4.3.2.2. Object raising: V-inf raising and V-ndo raising; 4.3.2.3. A constraint on coreference; 4.3.3. Passive; 4.3.4. Clitic climbing; 4.3.5. Se movement; NOTES; 5. THEORETICAL APPLICATIONS OF THE CONSTRUCTION OF SYNTACTICAL CLASSES OF VERBS; 5.1. Introduction; 5.2. Clitic climbing: an «explicative» hypothesis5.3. Clitic climbing revisited: additional problems 5.4. Conclusion; NOTES; 6. ANNEX; 6.1. TABLES; 6.2. VERB CLASSIFICATIONS; 6.3. INDEX OF VERBS; REFERENCESThe aim of the present work is to study the main distributional and transformational properties of verbs with a non-prepositional sentential complement in the two-argument sentence in Spanish.Linguisticae investigationes.Supplementa ;14.Spanish languageSyntaxSpanish languageVerb phraseSpanish languageVerbSpanish languageComplementSpanish languageGrammar, GenerativeSpanish languageSyntax.Spanish languageVerb phrase.Spanish languageVerb.Spanish languageComplement.Spanish languageGrammar, Generative.400Subirats Rüggeberg Carlos856687MiAaPQMiAaPQMiAaPQBOOK9910966276503321Sentential complementation in Spanish4375690UNINA