LEADER 06471nam 2200565 450 001 996464420503316 005 20211008065407.0 010 $a3-030-70626-5 024 7 $a10.1007/978-3-030-70626-5 035 $a(CKB)4100000011797595 035 $a(DE-He213)978-3-030-70626-5 035 $a(MiAaPQ)EBC6515577 035 $a(Au-PeEL)EBL6515577 035 $a(OCoLC)1243532679 035 $a(PPN)254719007 035 $a(EXLCZ)994100000011797595 100 $a20211008d2021 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aHuman Centered Computing $e6th International Conference, HCC 2020, virtual event, December 14-15, 2020, revised selected papers /$fQiaohong Zu, Yong Tang, Vladimir Mladenovic? (editors) 205 $a1st ed. 2021. 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (XIII, 478 p. 258 illus., 209 illus. in color.) 225 1 $aLecture notes in computer science ;$v12634 311 $a3-030-70625-7 320 $aIncludes bibliographical references and index. 327 $aDynamic Pick and Place Trajectory of Delta Parallel Manipulator -- Design of aquatic product traceability coding scheme based on EPC label -- DEVS-based Modeling and Simulation of Wireless Sensor Network -- Spatial Reciprocity Aided CSI Acquirement for HST Massive MIMO -- A flexible film thermocouple temperature sensor -- Design of a Morphing Surface Using Auxetic Lattice Skin for Space-Reconfigurable Reflectors -- The Method of User Information Fusion Oriented to Manufacturing Service Value Net -- Image Fusion Method for Transformer Substation Based on NSCT and Visual Saliency -- Permission Dispatching Mechanism Inside and Outside of the Warranty Period for Equipment Maintenance Service System -- New Technology Development and Application Trends Based on Monitoring of Patent Data -- A K-means clustering optimization algorithm for spatiotemporal trajectory data -- Temporal and Spatial Changes of Ecosystem Health in Guangdong Province in Recent 11 years -- Salient Attention Model and Classes Imbalance Remission for Video Anomaly Analysis with Weak Label -- A Data Fusion Model based on Multi-source Non-real-time Intelligence -- Ancient Chinese Lexicon Construction Based on Unsupervised Algorithm of Minimum Entropy and CBDB Optimization -- Availability Analysis of GNSS RAIM based on Maximum Undetectable Position Bias -- Psychological semantic differences of Zhang Juzheng before and after DuoQing event -- Digital Rights Management Platform Based on Blockchain Technology -- A Deep Hybrid Neural Network Forecasting for Multivariate Non-stationary Time Series -- Risk Assessment of Flood Disasters in Hechi City Based on GIS -- Cultural Symbol Recognition Algorithm Based on CTPN+CRNN -- Spatial-temporal Variation and Future Changing Trend of NDVI in the Pearl River Basin from 1982 to 2015 -- An Improved Collaborative Filtering Algorithm Based on Filling Missing Data -- Diagnosis method of Alzheimer's disease in PET image based on CNN multi-mode network -- Research on Multi-floor Path Planning Based on Recommendation Factors -- E-commerce Review Classification Based on SVM -- Experimental Research of Galfenol Composite Cantilever -- A capacitive flexible tactile sensor -- Multi-objective optimization of e-commerce logistics warehouse layout based on genetic algorithm -- Magnetic Circuit Design of Galfenol Composite Cantilever.-A MEMS-based piezoelectric pump with a low frequency and high flow -- Micro-video learning resource portrait and its application -- Research on Downscaling and Correction of TRMM Data in the Central China -- Research on the Knowledge Map of Combat Simulation Domain Based on Relational Database -- Scale-Aware Network with Attentional Selection For Human Pose Estimation -- Short-term Traffic Flow Prediction Based on SVR and LSTM -- A Logging Overhead Optimization Method Based on Anomaly Detection Model -- Multi-objective collaborative optimization of multi-level inventory: a model driven by after-sales service -- The Research About Spatial Distribution of Urban Functions Based on POI Data -- The Psychological Characteristics Changes Analysis of Su Shi before and after the Wutai Poetry Case ? Based on the CC-LIWC -- A Conference Publishing System Based on Academic Social Network -- Software Component Library Management Mechanism for Equipment Parts Service Value-Net -- No-reference quality assessment for Uav patrol images of Transmission line -- An Inclusive Finance Consortium Blockchain Platform for Secure Data Storage and Value Analysis for Small and Medium-sized Enterprises -- An Under-Sampling Method of Unbalanced Data Classification Based on Support Vector -- Image classification algorithm for transmission line defects based on dual-channel feature fusion -- Research on Alarm Causality Filtering Based on Association Mining -- Exploring Psycholinguistic Differences between Song and Ming Emperoes bases on Literary Edicts -- The Influence of the Reform of Entrance Examination on University Development. 330 $aThis book constitutes thoroughly reviewed, revised and selected papers from the 6th International Conference on Human Centered Computing, HCC 2020, held in virtually, due to COVID- 19, in December 2020. The 28 full and 20 short papers presented in this volume were carefully reviewed and selected from a total of 133 submissions. The conference focuses on the following three main themes as follows: Data such as Data Visualization, Big Data, Data Security, Hyper connectivity such as Internet of Things, Cloud Computing, Mobile Network and Collaboration such as Collective Intelligence, Peer Production, Context Awareness and much more. 410 0$aLecture notes in computer science ;$v12634. 606 $aUbiquitous computing$vCongresses 606 $aHuman-computer interaction$vCongresses 606 $aUser-centered system design$vCongresses 615 0$aUbiquitous computing 615 0$aHuman-computer interaction 615 0$aUser-centered system design 676 $a004 702 $aTang$b Yong 702 $aMladenovic?$b Vladimir 702 $aZu$b Qiaohong 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996464420503316 996 $aHuman Centered Computing$91896714 997 $aUNISA LEADER 01005nam a22002531i 4500 001 991002501249707536 005 20040331081918.0 008 040407s1963 it a||||||||||||||||ita 035 $ab12932061-39ule_inst 035 $aARCHE-091167$9ExL 040 $aDip.to Scienze Storiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a709.45 100 1 $aMuraro, Michelangelo$0151747 245 10$aPasquale Poccianti restauratore di monumenti fiorentini /$cM. Muraro 260 $aFirenze :$bOlschki,$c1963 300 $aP. 80-87 :$bill. ;$c24 cm 500 $aEstr. da : Rivista d'Arte, v. 36, Annuario 1961-62 650 4$aArte$zItalia 907 $a.b12932061$b02-04-14$c16-04-04 912 $a991002501249707536 945 $aLE009 ARTE MISC. 64/36$g1$i2009000347021$lle009$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i13506547$z16-04-04 996 $aPasquale Poccianti restauratore di monumenti fiorentini$9281751 997 $aUNISALENTO 998 $ale009$b16-04-04$cm$da $e-$fita$git $h0$i1 LEADER 05360oam 2200613 450 001 9910792484503321 005 20190911100030.0 010 $a0-12-407926-1 035 $a(OCoLC)858926165 035 $a(MiFhGG)GVRL6ZWN 035 $a(EXLCZ)992660000000011102 100 $a20130429d2013 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aIntroduction to cyber-warfare $ea multidisciplinary approach /$fPaulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia 205 $a1st edition 210 $aAmsterdam [Netherlands] $cMorgan Kaufmann Publishers, an imprint of Elsevier$d2013 210 1$aWaltham, MA :$cSyngress,$d2013. 215 $a1 online resource (xvii, 318 pages) $cillustrations (some color), map 225 0 $aGale eBooks 300 $aDescription based upon print version of record. 311 $a0-12-407814-1 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service 327 $aThe Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ?s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary 327 $aCyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ? ? of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading 327 $aReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ? ?; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes 327 $aThe Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ? ? Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ? Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology 327 $aArab Spring 330 $aIntroduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.Provides a multi-disciplinary approach t 606 $aInformation warfare$vCase studies 606 $aCyberterrorism 606 $aCyberspace$xSecurity measures 606 $aComputer crimes 606 $aData protection 610 $ainformation assurance$aattribution 615 0$aInformation warfare 615 0$aCyberterrorism. 615 0$aCyberspace$xSecurity measures. 615 0$aComputer crimes. 615 0$aData protection. 676 $a355.4 700 $aShakarian$b Paulo$0791399 702 $aShakarian$b Jana 702 $aRuef$b Andrew 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910792484503321 996 $aIntroduction to cyber-warfare$93732483 997 $aUNINA