top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 412 p. 114 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Operating systems (Computers)
Computers
Law and legislation
Computers and civilization
Application software
Data encryption (Computer science)
Systems and Data Security
Operating Systems
Legal Aspects of Computing
Computers and Society
Information Systems Applications (incl. Internet)
Cryptology
ISBN 3-319-60876-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security.
Record Nr. UNISA-996466460303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Detection of Intrusions and Malware, and Vulnerability Assessment : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 412 p. 114 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Operating systems (Computers)
Computers
Law and legislation
Computers and civilization
Application software
Data encryption (Computer science)
Systems and Data Security
Operating Systems
Legal Aspects of Computing
Computers and Society
Information Systems Applications (incl. Internet)
Cryptology
ISBN 3-319-60876-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security.
Record Nr. UNINA-9910484228403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Forensics and Cyber Crime : 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings / / edited by Frank Breitinger, Ibrahim Baggili
Digital Forensics and Cyber Crime : 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings / / edited by Frank Breitinger, Ibrahim Baggili
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 235 p. 317 illus., 31 illus. in color.)
Disciplina 363.25968
005.8
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Artificial intelligence
Data protection
Computers
Law and legislation
Software engineering
Artificial Intelligence
Security
Legal Aspects of Computing
Software Engineering/Programming and Operating Systems
ISBN 3-030-05487-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving -- fishy - A Framework for Implementing Filesystem-based Data Hiding Techniques -- If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proof-of-Concept -- AndroParse - An Android Feature Extraction -- Digital Forensic Readiness Framework for Ransomware Investigation -- Forensics Analysis of an On-line Game over Steam Platform -- A Digital Forensic Investigation and Verification Model for Industria l Espionage -- Hard Drives and Digital Forensics -- Solid State Drive Forensics: Where Do We Stand? -- Associating Drives Based on Their Artifact and Metadata Distributions -- Digital Forensics Event Graph Reconstruction -- Multi-Item Passphrases: A Self-Adaptive Approach -- Against Offline Guessing Attacks -- Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior.
Record Nr. UNINA-9910337854203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Forensics and Cyber Crime : 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings / / edited by Petr Matoušek, Martin Schmiedecker
Digital Forensics and Cyber Crime : 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings / / edited by Petr Matoušek, Martin Schmiedecker
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (X, 235 p. 83 illus.)
Disciplina 363.25968
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer security
Computers
Law and legislation
Data protection
Computers and civilization
Management information systems
Computer science
Systems and Data Security
Legal Aspects of Computing
Security
Computers and Society
Management of Computing and Information Systems
ISBN 3-319-73697-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto FindEvasion : An Effective Environment-sensitive Malware Detection System for the Cloud -- Real-time Forensics through Endpoint Visibility -- Locky ransomware, Al Capone and Brexit Deanonymization -- Finding and Rating Personal Names on Drives for Forensic Needs -- A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness -- Open Source Forensics for a Multi-platform Drone System -- A Novel File Carving Algorithm for EVTX Logs -- Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence -- Cyber Crime Investigation and Digital Forensics Triage -- Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector -- A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph --  Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees -- Approxis: a fast, robust, lightweight and approximate Disassembler considered in the field of memory forensics -- Memory Forensics and the Macintosh OS X Operating System -- Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation -- An Overview of the Usage of Default Passwords Hacking -- Automation of MitM Attack on Wi-Fi Networks -- SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle -- Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets.
Record Nr. UNINA-9910299293703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Forensics and Cyber Crime : Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers / / edited by Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili
Digital Forensics and Cyber Crime : Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers / / edited by Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 253 p. 68 illus.)
Disciplina 005.8
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer security
Computers
Law and legislation
E-commerce
Computers and civilization
Data structures (Computer science)
Management information systems
Computer science
Systems and Data Security
Legal Aspects of Computing
e-Commerce/e-business
Computers and Society
Data Structures and Information Theory
Management of Computing and Information Systems
ISBN 3-319-14289-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Digital Forensics – Technical -- Information Warfare, Cyber Terrorism and Critical Infrastructure Protection -- Digital Forensics - Standards, Certification and Accreditation -- Automation in Digital Forensics.
Record Nr. UNINA-9910298992303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Humanism [[electronic resource] ] : For a Humane Transformation of Democracy, Economy and Culture in the Digital Age / / by Julian Nida-Rümelin, Nathalie Weidenfeld
Digital Humanism [[electronic resource] ] : For a Humane Transformation of Democracy, Economy and Culture in the Digital Age / / by Julian Nida-Rümelin, Nathalie Weidenfeld
Autore Nida-Rümelin Julian
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (IX, 127 p. 1 illus.)
Disciplina 303.4834
Soggetto topico Computers and civilization
Science—Philosophy
Political science
Communication in science
Computers—Law and legislation
Information technology—Law and legislation
Computers and Society
Philosophy of Science
Political Theory
Science Communication
Legal Aspects of Computing
Soggetto non controllato Digital Humanism
Philosophy of Computer Science
Computer Ethics
Scientific Communication
Artificial Intelligence
Computers and Society
ISBN 3-031-12482-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- 2. Robots as New (Digital) Slaves -- 3. Digital Simulations of Emotions -- 4. The Problem of Autonomy and Determination in the Digital World -- 5. The World as the Perfect Machine Universe -- 6. Digital Optimization, Utilitarianism and AI -- 7. Economic Rationality as a Software Program -- 8. Why Robots Don't Have Moral Judgment -- 9. Ethical Non-Comparability -- 10. Why AIs Fail at Moral Dilemmas -- 11. Why AIs Can't Think -- 12. Digital Virtualities and Sober Realities -- 13. On the Ethics of Internet Communication -- 14. On the Ethics of Communication between Humans and AI -- 15. Cultural Aspects of Digitalisation -- 16. Digital Education -- 17. Utopia of Liquid Democracy -- 18. Socio-Economic Aspects of Digitisation -- 19. Transhumanist Temptations -- 20. On the Metaphysics of digitalisation -- 21. Afterword.
Record Nr. UNISA-996490356203316
Nida-Rümelin Julian  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital Humanism : For a Humane Transformation of Democracy, Economy and Culture in the Digital Age / / by Julian Nida-Rümelin, Nathalie Weidenfeld
Digital Humanism : For a Humane Transformation of Democracy, Economy and Culture in the Digital Age / / by Julian Nida-Rümelin, Nathalie Weidenfeld
Autore Nida-Rümelin Julian
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (IX, 127 p. 1 illus.)
Disciplina 303.4834
Soggetto topico Computers and civilization
Science—Philosophy
Political science
Communication in science
Computers—Law and legislation
Information technology—Law and legislation
Computers and Society
Philosophy of Science
Political Theory
Science Communication
Legal Aspects of Computing
Soggetto non controllato Digital Humanism
Philosophy of Computer Science
Computer Ethics
Scientific Communication
Artificial Intelligence
Computers and Society
ISBN 3-031-12482-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- 2. Robots as New (Digital) Slaves -- 3. Digital Simulations of Emotions -- 4. The Problem of Autonomy and Determination in the Digital World -- 5. The World as the Perfect Machine Universe -- 6. Digital Optimization, Utilitarianism and AI -- 7. Economic Rationality as a Software Program -- 8. Why Robots Don't Have Moral Judgment -- 9. Ethical Non-Comparability -- 10. Why AIs Fail at Moral Dilemmas -- 11. Why AIs Can't Think -- 12. Digital Virtualities and Sober Realities -- 13. On the Ethics of Internet Communication -- 14. On the Ethics of Communication between Humans and AI -- 15. Cultural Aspects of Digitalisation -- 16. Digital Education -- 17. Utopia of Liquid Democracy -- 18. Socio-Economic Aspects of Digitisation -- 19. Transhumanist Temptations -- 20. On the Metaphysics of digitalisation -- 21. Afterword.
Record Nr. UNINA-9910595051403321
Nida-Rümelin Julian  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Rights Management [[electronic resource] ] : Technologies, Issues, Challenges and Systems / / edited by Reihaneh Safavi-Naini, Moti Yung
Digital Rights Management [[electronic resource] ] : Technologies, Issues, Challenges and Systems / / edited by Reihaneh Safavi-Naini, Moti Yung
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 360 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Computers and civilization
Computers—Law and legislation
Information technology—Law and legislation
Electronic data processing—Management
Cryptology
Computer Communication Networks
Operating Systems
Computers and Society
Legal Aspects of Computing
IT Operations
ISBN 3-540-35999-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Assurance and Authentication Issues -- A Novel Framework for Multiple Creatorship Protection of Digital Movies -- TIVA: Trusted Integrity Verification Architecture -- Legal and Related Issues -- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? -- Downloading vs Purchase: Music Industry vs Consumers -- Digital Rights Management: Merging Contract, Copyright and Criminal Law -- Expressing Rights and Management -- User-Attributed Rights in DRM -- AVS-REL—A New Right Expression Language -- A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights -- Watermarking -- The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks -- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream -- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform -- Software Issues -- Software Tamper Resistance Through Dynamic Program Monitoring -- Call Tree Transformation for Program Obfuscation and Copy Protection -- Algorithms to Watermark Software Through Register Allocation -- Fingerprinting and Image Authentication -- An Efficient Fingerprinting Scheme with Secret Sharing -- Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion -- Secure Remote Fingerprint Verification Using Dual Watermarks -- Supporting Cryptographic Technology -- Security Weaknesses of Certain Broadcast Encryption Schemes -- A Broadcast Encryption Scheme with Free-Riders but Unconditional Security -- A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys -- A Vector Approach to Cryptography Implementation -- P2P Issues -- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network -- Design of a Secure Digital Contents Delivery System in P2P Networks -- Implementations and Architectures -- Real-Time Implementation of Broadcast Switching System Using Audio Watermark -- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing -- A DRM System Supporting What You See Is What You Pay.
Record Nr. UNISA-996466253003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital Rights Management : Technologies, Issues, Challenges and Systems / / edited by Reihaneh Safavi-Naini, Moti Yung
Digital Rights Management : Technologies, Issues, Challenges and Systems / / edited by Reihaneh Safavi-Naini, Moti Yung
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 360 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Computers and civilization
Computers—Law and legislation
Information technology—Law and legislation
Electronic data processing—Management
Cryptology
Computer Communication Networks
Operating Systems
Computers and Society
Legal Aspects of Computing
IT Operations
ISBN 3-540-35999-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Assurance and Authentication Issues -- A Novel Framework for Multiple Creatorship Protection of Digital Movies -- TIVA: Trusted Integrity Verification Architecture -- Legal and Related Issues -- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? -- Downloading vs Purchase: Music Industry vs Consumers -- Digital Rights Management: Merging Contract, Copyright and Criminal Law -- Expressing Rights and Management -- User-Attributed Rights in DRM -- AVS-REL—A New Right Expression Language -- A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights -- Watermarking -- The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks -- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream -- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform -- Software Issues -- Software Tamper Resistance Through Dynamic Program Monitoring -- Call Tree Transformation for Program Obfuscation and Copy Protection -- Algorithms to Watermark Software Through Register Allocation -- Fingerprinting and Image Authentication -- An Efficient Fingerprinting Scheme with Secret Sharing -- Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion -- Secure Remote Fingerprint Verification Using Dual Watermarks -- Supporting Cryptographic Technology -- Security Weaknesses of Certain Broadcast Encryption Schemes -- A Broadcast Encryption Scheme with Free-Riders but Unconditional Security -- A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys -- A Vector Approach to Cryptography Implementation -- P2P Issues -- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network -- Design of a Secure Digital Contents Delivery System in P2P Networks -- Implementations and Architectures -- Real-Time Implementation of Broadcast Switching System Using Audio Watermark -- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing -- A DRM System Supporting What You See Is What You Pay.
Record Nr. UNINA-9910484944103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Rights Management [[electronic resource] ] : ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers / / edited by Joan Feigenbaum
Digital Rights Management [[electronic resource] ] : ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers / / edited by Joan Feigenbaum
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (X, 222 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Computers and civilization
Computers
Law and legislation
Cryptology
Computer Communication Networks
Science, Humanities and Social Sciences, multidisciplinary
Operating Systems
Computers and Society
Legal Aspects of Computing
ISBN 3-540-44993-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ACM DRM 2002 -- A White-Box DES Implementation for DRM Applications -- Attacking an Obfuscated Cipher by Injecting Faults -- Breaking and Repairing Asymmetric Public-Key Traitor Tracing -- Key Challenges in DRM: An Industry Perspective -- Public Key Broadcast Encryption for Stateless Receivers -- Traitor Tracing for Shortened and Corrupted Fingerprints -- Evaluating New Copy-Prevention Techniques for Audio CDs -- Towards Meeting the Privacy Challenge: Adapting DRM -- Implementing Copyright Limitations in Rights Expression Languages -- The Darknet and the Future of Content Protection -- Replacement Attack on Arbitrary Watermarking Systems -- FAIR: Fair Audience InfeRence -- Theft-Protected Proprietary Certificates.
Record Nr. UNISA-996466056903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui