top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVII, 651 p. 252 illus., 134 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Application software
Software engineering
Computers
Law and legislation
Systems and Data Security
Cryptology
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Legal Aspects of Computing
ISBN 3-030-24268-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust.
Record Nr. UNISA-996466212103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVII, 655 p. 342 illus., 214 illus. in color.)
Disciplina 006.3
Collana Security and Cryptology
Soggetto topico Computer security
Artificial intelligence
Computers
Computer communication systems
Optical data processing
Law and legislation
Systems and Data Security
Artificial Intelligence
Information Systems and Communication Service
Computer Communication Networks
Image Processing and Computer Vision
Legal Aspects of Computing
ISBN 3-030-24274-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud Computing -- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching -- NOAA-LSTM: A New Method of Dialect Identification -- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network -- Research on the Promotion of Tibetan New Words and Platform Design -- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm -- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields -- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM -- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud -- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network -- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process -- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix -- Research on Settlement Deformation of Asphalt Pavement Structure in Soft Soil Zone Based on Pavement Settlement Theory -- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation -- A Novel Noise Filter Based on Multiple Voting -- Fuzzy Control Method for Path Tracking System of Combine Harvester -- Research on Opinion Spam Detection by Time Series Anomaly Detection -- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images -- Intra-class Classification of Architectural Styles Using Visualization of CNN -- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks -- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module -- A Novel Distributed Knowledge Reasoning Model -- Research on Detection Method Of Abnormal Traffic In SDN -- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth -- PPD-DL: Privacy-Preserving Decentralized Deep Learning -- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids -- Android Malware Identification Based on Traffic Analysis -- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary -- Research on the Efficiency and Application of Ship- helicopter Cooperative Search -- Cellular Neural Network Based Contour Detection for Seismic Image -- Discovering New Sensitive Words Based on Sensitive Information Categorization -- A Dynamic Event Region Tracking Approach Based on Node Calibration -- A Graph Updating Method of Data Theft Detection Based on Rough Set -- A Tutorial of Graph Representation -- Ground-based Cloud Images Recognition Based on GAN and PCANet -- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules -- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising -- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging -- DWI Fiber Tracking with Functional MRI of White Matter -- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm -- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network -- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI -- Convolutional Neural Networks for Scene Image Recognition -- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology -- Research on Detection Method of Unhealthy Message in Social Network -- Image Authentication by Single Target Region Detection -- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security -- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks -- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption -- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning -- Facial Expression Recognition Based on Complete Local Binary Pattern and Convolutional Neural Network -- A Novel Malware Detection and Classification Method Based on Capsule Network -- Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain Recognition -- Implementation of MD5 Collision Attack in Program -- Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm -- Monochromatic Mutual Nearest Neighbor Queries over Uncertain Data -- Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse -- Efficient PatchMatch-based Image Registration and Retargeting for Cartoon Animation.
Record Nr. UNISA-996466212703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVII, 655 p. 342 illus., 214 illus. in color.)
Disciplina 006.3
005.8
Collana Security and Cryptology
Soggetto topico Computer security
Artificial intelligence
Computers
Computer communication systems
Optical data processing
Law and legislation
Systems and Data Security
Artificial Intelligence
Information Systems and Communication Service
Computer Communication Networks
Image Processing and Computer Vision
Legal Aspects of Computing
ISBN 3-030-24274-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud Computing -- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching -- NOAA-LSTM: A New Method of Dialect Identification -- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network -- Research on the Promotion of Tibetan New Words and Platform Design -- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm -- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields -- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM -- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud -- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network -- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process -- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix -- Research on Settlement Deformation of Asphalt Pavement Structure in Soft Soil Zone Based on Pavement Settlement Theory -- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation -- A Novel Noise Filter Based on Multiple Voting -- Fuzzy Control Method for Path Tracking System of Combine Harvester -- Research on Opinion Spam Detection by Time Series Anomaly Detection -- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images -- Intra-class Classification of Architectural Styles Using Visualization of CNN -- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks -- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module -- A Novel Distributed Knowledge Reasoning Model -- Research on Detection Method Of Abnormal Traffic In SDN -- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth -- PPD-DL: Privacy-Preserving Decentralized Deep Learning -- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids -- Android Malware Identification Based on Traffic Analysis -- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary -- Research on the Efficiency and Application of Ship- helicopter Cooperative Search -- Cellular Neural Network Based Contour Detection for Seismic Image -- Discovering New Sensitive Words Based on Sensitive Information Categorization -- A Dynamic Event Region Tracking Approach Based on Node Calibration -- A Graph Updating Method of Data Theft Detection Based on Rough Set -- A Tutorial of Graph Representation -- Ground-based Cloud Images Recognition Based on GAN and PCANet -- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules -- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising -- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging -- DWI Fiber Tracking with Functional MRI of White Matter -- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm -- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network -- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI -- Convolutional Neural Networks for Scene Image Recognition -- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology -- Research on Detection Method of Unhealthy Message in Social Network -- Image Authentication by Single Target Region Detection -- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security -- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks -- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption -- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning -- Facial Expression Recognition Based on Complete Local Binary Pattern and Convolutional Neural Network -- A Novel Malware Detection and Classification Method Based on Capsule Network -- Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain Recognition -- Implementation of MD5 Collision Attack in Program -- Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm -- Monochromatic Mutual Nearest Neighbor Queries over Uncertain Data -- Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse -- Efficient PatchMatch-based Image Registration and Retargeting for Cartoon Animation.
Record Nr. UNINA-9910349309903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVII, 651 p. 252 illus., 134 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Application software
Software engineering
Computers
Law and legislation
Systems and Data Security
Cryptology
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Legal Aspects of Computing
ISBN 3-030-24268-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust.
Record Nr. UNINA-9910349310103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence, Computational Modelling and Criminal Proceedings : A Framework for A European Legal Discussion / / by Serena Quattrocolo
Artificial Intelligence, Computational Modelling and Criminal Proceedings : A Framework for A European Legal Discussion / / by Serena Quattrocolo
Autore Quattrocolo Serena
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (242 pages) : illustrations
Disciplina 345.4
Collana Legal Studies in International, European and Comparative Criminal Law
Soggetto topico Criminal law - European Union countries
Private international law
Conflict of laws
Mass media
Law
Computers
Law and legislation
European Criminal Law
Private International Law, International & Foreign Law, Comparative Law
IT Law, Media Law, Intellectual Property
Legal Aspects of Computing
Intel·ligència artificial
Investigació criminal
Soggetto genere / forma Llibres electrònics
ISBN 3-030-52470-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Introducing the Problem -- 1. Approaching the Unknown: Some Preliminary Words -- 2. A Theoretical Framework for the Discussion on AI and Criminal Law -- Part II Direct and Indirect Impact of Widespread Computational Modelling on Evidence Gathering -- 3. Hacking by Law-Enforcement: Investigating with the Help of Computational Models and AI Methods -- 4. Equality of Arms and Automatedly Generated Evidence -- Part III: Challenges of Computational Methods to the Judicial Decision-Making Process: Deciding v. Predicting -- 5. Predictability and Criminal Justice -- 6. Predictability of Violent Behaviour and Recidivism -- 7. Predictability and the Criminal Justice Decision-Making Process -- 8. The Gist of the Inquiry.
Record Nr. UNINA-9910416140803321
Quattrocolo Serena  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Autore Steffens Timo
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Descrizione fisica 1 online resource (XIV, 205 p. 49 illus.)
Disciplina 005.8
Soggetto topico Computer security
Computers
Law and legislation
Computer communication systems
Application software
Systems and Data Security
Legal Aspects of Computing
Privacy
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-662-61313-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advanced Persistent Threats -- The attribution process.-Analysis of malware -- Attack infrastructure -- Analysis of control servers -- Geopolitical analysis -- Telemetry - data from security products -- Methods of intelligence agencies -- Doxing -- False flags -- Group set-ups -- Communication -- Ethics of attribution.
Record Nr. UNINA-9910413440203321
Steffens Timo  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Autore Steffens Timo
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Descrizione fisica 1 online resource (XIV, 205 p. 49 illus.)
Disciplina 005.8
Soggetto topico Computer security
Computers
Law and legislation
Computer communication systems
Application software
Systems and Data Security
Legal Aspects of Computing
Privacy
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-662-61313-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advanced Persistent Threats -- The attribution process.-Analysis of malware -- Attack infrastructure -- Analysis of control servers -- Geopolitical analysis -- Telemetry - data from security products -- Methods of intelligence agencies -- Doxing -- False flags -- Group set-ups -- Communication -- Ethics of attribution.
Record Nr. UNISA-996465367703316
Steffens Timo  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Beyond Data Protection [[electronic resource] ] : Strategic Case Studies and Practical Guidance / / edited by Noriswadi Ismail, Edwin Lee Yong Cieh
Beyond Data Protection [[electronic resource] ] : Strategic Case Studies and Practical Guidance / / edited by Noriswadi Ismail, Edwin Lee Yong Cieh
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (276 p.)
Disciplina 342.0858
Soggetto topico Private international law
Conflict of laws
Mass media
Law
Computers
Law and legislation
Private International Law, International & Foreign Law, Comparative Law
IT Law, Media Law, Intellectual Property
Legal Aspects of Computing
Soggetto genere / forma Cross-cultural studies.
ISBN 1-299-33554-3
3-642-33081-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Noriswadi Ismail, Introduction --  Edwin Lee Yong Cieh, Personal Data Protection and Privacy law in Malaysia -- Edwin Lee Yong Cieh, Personal Data Protection Act 2010 : An Overview Analysis -- Edwin Lee Yong Cieh, Limitations Of The Personal Data Protection Act 2010 and Personal Data Protection in Selected Sectors -- Noriswadi Ismail, Technology and ‘Actors’ In Data Protection -- Noriswadi Ismail, Selected Technologies’ Appraisal from The PDPA 2010’s Lens -- Noriswadi Ismail, Acclaiming Accountability. Preaching Best Practices -- Eduardo Ustaran, The Scope of Application of EU Data Protection Law And its Extraterritorial Reach -- Eva Rose Rahim, Information Security In The Internet Age -- Indirani Viknaraja, Data Protection and Local Authorities in the United Kingdom -- Dan Manolescu, Data Protection Enforcement: The European Experience – Case Law -- Philipp E. Fischer, Data Protection Audit – The German Experience -- Noriswadi Ismail/Edwin Lee Yong Cieh, Concluding Remarks.
Record Nr. UNINA-9910438231003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data in Context : Legal, Social and Technological Insights / / edited by Thomas Hoeren, Barbara Kolany-Raiser
Big Data in Context : Legal, Social and Technological Insights / / edited by Thomas Hoeren, Barbara Kolany-Raiser
Autore Hoeren Thomas
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 120 p.)
Disciplina 343.099
Collana SpringerBriefs in Law
Soggetto topico Information technology - Law and legislation
Mass media - Law and legislation
Quantitative research
Data mining
Law - Europe
Computers - Law and legislation
IT Law, Media Law, Intellectual Property
Data Analysis and Big Data
Data Mining and Knowledge Discovery
European Law
Legal Aspects of Computing
ISBN 3-319-62461-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Thomas Hoeren, Big Data and Data Quality -- Christian Döpke, The Importance of Big Data for Jurisprudence and Legal Practice -- Nicolai Culik and Christian Döpke, About Forgetting and Being Forgotten -- Nicolai Culik, Brussels Calling: Big Data and Privacy -- Andreas Börding, Safe Harbor: The Decision of the European Court of Justice -- Tim Jülicher, Education 2.0: Learning Analytics, Educational Data Mining and Co. -- Max v. Schönfeld, Big Data and Automotive – A Legal Approach -- Stefanie Eschholz and Jonathan Djabbarpour, Big Data and Scoring in the Financial Sector -- Charlotte Röttgen, Like or Dislike – Web Tracking -- Tim Jülicher and Marc Delisle, Step into “The Circle” – A Close Look at Wearables and Quantified Self -- Max v. Schönfeld and Nils Wehkamp, Big Data and Smart Grid -- Max v. Schönfeld, Reinhard Heil and Laura Bittner, Big Data on a Farm – Smart Farming.
Record Nr. UNINA-9910231244803321
Hoeren Thomas  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Digital Forensic Data [[electronic resource] ] : Volume 1: Data Reduction Framework and Selective Imaging / / by Darren Quick, Kim-Kwang Raymond Choo
Big Digital Forensic Data [[electronic resource] ] : Volume 1: Data Reduction Framework and Selective Imaging / / by Darren Quick, Kim-Kwang Raymond Choo
Autore Quick Darren
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (109 pages)
Disciplina 363.25968
Collana SpringerBriefs on Cyber Security Systems and Networks
Soggetto topico Computer security
Application software
Forensic science
Computers
Law and legislation
Systems and Data Security
Information Systems Applications (incl. Internet)
Forensic Science
Legal Aspects of Computing
Computer Appl. in Social and Behavioral Sciences
ISBN 981-10-7763-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 Introduction -- Chapter 2 Background and Literature Review -- Chapter 3 Data Reduction and Data Mining Framework -- Chapter 4 Digital Forensic Data Reduction by Selective Imaging -- Chapter 5 Summary of the Framework and DRbSI.
Record Nr. UNINA-9910299287503321
Quick Darren  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui