Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVII, 651 p. 252 illus., 134 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Application software Software engineering Computers Law and legislation Systems and Data Security Cryptology Computer Communication Networks Information Systems Applications (incl. Internet) Software Engineering Legal Aspects of Computing |
ISBN | 3-030-24268-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust. |
Record Nr. | UNISA-996466212103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVII, 655 p. 342 illus., 214 illus. in color.) |
Disciplina | 006.3 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Artificial intelligence Computers Computer communication systems Optical data processing Law and legislation Systems and Data Security Artificial Intelligence Information Systems and Communication Service Computer Communication Networks Image Processing and Computer Vision Legal Aspects of Computing |
ISBN | 3-030-24274-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cloud Computing -- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching -- NOAA-LSTM: A New Method of Dialect Identification -- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network -- Research on the Promotion of Tibetan New Words and Platform Design -- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm -- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields -- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM -- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud -- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network -- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process -- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix -- Research on Settlement Deformation of Asphalt Pavement Structure in Soft Soil Zone Based on Pavement Settlement Theory -- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation -- A Novel Noise Filter Based on Multiple Voting -- Fuzzy Control Method for Path Tracking System of Combine Harvester -- Research on Opinion Spam Detection by Time Series Anomaly Detection -- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images -- Intra-class Classification of Architectural Styles Using Visualization of CNN -- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks -- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module -- A Novel Distributed Knowledge Reasoning Model -- Research on Detection Method Of Abnormal Traffic In SDN -- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth -- PPD-DL: Privacy-Preserving Decentralized Deep Learning -- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids -- Android Malware Identification Based on Traffic Analysis -- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary -- Research on the Efficiency and Application of Ship- helicopter Cooperative Search -- Cellular Neural Network Based Contour Detection for Seismic Image -- Discovering New Sensitive Words Based on Sensitive Information Categorization -- A Dynamic Event Region Tracking Approach Based on Node Calibration -- A Graph Updating Method of Data Theft Detection Based on Rough Set -- A Tutorial of Graph Representation -- Ground-based Cloud Images Recognition Based on GAN and PCANet -- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules -- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising -- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging -- DWI Fiber Tracking with Functional MRI of White Matter -- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm -- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network -- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI -- Convolutional Neural Networks for Scene Image Recognition -- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology -- Research on Detection Method of Unhealthy Message in Social Network -- Image Authentication by Single Target Region Detection -- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security -- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks -- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption -- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning -- Facial Expression Recognition Based on Complete Local Binary Pattern and Convolutional Neural Network -- A Novel Malware Detection and Classification Method Based on Capsule Network -- Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain Recognition -- Implementation of MD5 Collision Attack in Program -- Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm -- Monochromatic Mutual Nearest Neighbor Queries over Uncertain Data -- Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse -- Efficient PatchMatch-based Image Registration and Retargeting for Cartoon Animation. |
Record Nr. | UNISA-996466212703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVII, 655 p. 342 illus., 214 illus. in color.) |
Disciplina |
006.3
005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Artificial intelligence Computers Computer communication systems Optical data processing Law and legislation Systems and Data Security Artificial Intelligence Information Systems and Communication Service Computer Communication Networks Image Processing and Computer Vision Legal Aspects of Computing |
ISBN | 3-030-24274-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cloud Computing -- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching -- NOAA-LSTM: A New Method of Dialect Identification -- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network -- Research on the Promotion of Tibetan New Words and Platform Design -- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm -- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields -- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM -- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud -- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network -- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process -- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix -- Research on Settlement Deformation of Asphalt Pavement Structure in Soft Soil Zone Based on Pavement Settlement Theory -- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation -- A Novel Noise Filter Based on Multiple Voting -- Fuzzy Control Method for Path Tracking System of Combine Harvester -- Research on Opinion Spam Detection by Time Series Anomaly Detection -- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images -- Intra-class Classification of Architectural Styles Using Visualization of CNN -- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks -- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module -- A Novel Distributed Knowledge Reasoning Model -- Research on Detection Method Of Abnormal Traffic In SDN -- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth -- PPD-DL: Privacy-Preserving Decentralized Deep Learning -- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids -- Android Malware Identification Based on Traffic Analysis -- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary -- Research on the Efficiency and Application of Ship- helicopter Cooperative Search -- Cellular Neural Network Based Contour Detection for Seismic Image -- Discovering New Sensitive Words Based on Sensitive Information Categorization -- A Dynamic Event Region Tracking Approach Based on Node Calibration -- A Graph Updating Method of Data Theft Detection Based on Rough Set -- A Tutorial of Graph Representation -- Ground-based Cloud Images Recognition Based on GAN and PCANet -- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules -- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising -- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging -- DWI Fiber Tracking with Functional MRI of White Matter -- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm -- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network -- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI -- Convolutional Neural Networks for Scene Image Recognition -- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology -- Research on Detection Method of Unhealthy Message in Social Network -- Image Authentication by Single Target Region Detection -- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security -- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks -- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption -- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning -- Facial Expression Recognition Based on Complete Local Binary Pattern and Convolutional Neural Network -- A Novel Malware Detection and Classification Method Based on Capsule Network -- Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain Recognition -- Implementation of MD5 Collision Attack in Program -- Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm -- Monochromatic Mutual Nearest Neighbor Queries over Uncertain Data -- Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse -- Efficient PatchMatch-based Image Registration and Retargeting for Cartoon Animation. |
Record Nr. | UNINA-9910349309903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVII, 651 p. 252 illus., 134 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Application software Software engineering Computers Law and legislation Systems and Data Security Cryptology Computer Communication Networks Information Systems Applications (incl. Internet) Software Engineering Legal Aspects of Computing |
ISBN | 3-030-24268-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust. |
Record Nr. | UNINA-9910349310103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial Intelligence, Computational Modelling and Criminal Proceedings : A Framework for A European Legal Discussion / / by Serena Quattrocolo |
Autore | Quattrocolo Serena |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (242 pages) : illustrations |
Disciplina | 345.4 |
Collana | Legal Studies in International, European and Comparative Criminal Law |
Soggetto topico |
Criminal law - European Union countries
Private international law Conflict of laws Mass media Law Computers Law and legislation European Criminal Law Private International Law, International & Foreign Law, Comparative Law IT Law, Media Law, Intellectual Property Legal Aspects of Computing Intel·ligència artificial Investigació criminal |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-030-52470-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I: Introducing the Problem -- 1. Approaching the Unknown: Some Preliminary Words -- 2. A Theoretical Framework for the Discussion on AI and Criminal Law -- Part II Direct and Indirect Impact of Widespread Computational Modelling on Evidence Gathering -- 3. Hacking by Law-Enforcement: Investigating with the Help of Computational Models and AI Methods -- 4. Equality of Arms and Automatedly Generated Evidence -- Part III: Challenges of Computational Methods to the Judicial Decision-Making Process: Deciding v. Predicting -- 5. Predictability and Criminal Justice -- 6. Predictability of Violent Behaviour and Recidivism -- 7. Predictability and the Criminal Justice Decision-Making Process -- 8. The Gist of the Inquiry. |
Record Nr. | UNINA-9910416140803321 |
Quattrocolo Serena | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens |
Autore | Steffens Timo |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 |
Descrizione fisica | 1 online resource (XIV, 205 p. 49 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computers Law and legislation Computer communication systems Application software Systems and Data Security Legal Aspects of Computing Privacy Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-662-61313-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Advanced Persistent Threats -- The attribution process.-Analysis of malware -- Attack infrastructure -- Analysis of control servers -- Geopolitical analysis -- Telemetry - data from security products -- Methods of intelligence agencies -- Doxing -- False flags -- Group set-ups -- Communication -- Ethics of attribution. |
Record Nr. | UNINA-9910413440203321 |
Steffens Timo | ||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens |
Autore | Steffens Timo |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 |
Descrizione fisica | 1 online resource (XIV, 205 p. 49 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computers Law and legislation Computer communication systems Application software Systems and Data Security Legal Aspects of Computing Privacy Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-662-61313-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Advanced Persistent Threats -- The attribution process.-Analysis of malware -- Attack infrastructure -- Analysis of control servers -- Geopolitical analysis -- Telemetry - data from security products -- Methods of intelligence agencies -- Doxing -- False flags -- Group set-ups -- Communication -- Ethics of attribution. |
Record Nr. | UNISA-996465367703316 |
Steffens Timo | ||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Beyond Data Protection [[electronic resource] ] : Strategic Case Studies and Practical Guidance / / edited by Noriswadi Ismail, Edwin Lee Yong Cieh |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (276 p.) |
Disciplina | 342.0858 |
Soggetto topico |
Private international law
Conflict of laws Mass media Law Computers Law and legislation Private International Law, International & Foreign Law, Comparative Law IT Law, Media Law, Intellectual Property Legal Aspects of Computing |
Soggetto genere / forma | Cross-cultural studies. |
ISBN |
1-299-33554-3
3-642-33081-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Noriswadi Ismail, Introduction -- Edwin Lee Yong Cieh, Personal Data Protection and Privacy law in Malaysia -- Edwin Lee Yong Cieh, Personal Data Protection Act 2010 : An Overview Analysis -- Edwin Lee Yong Cieh, Limitations Of The Personal Data Protection Act 2010 and Personal Data Protection in Selected Sectors -- Noriswadi Ismail, Technology and ‘Actors’ In Data Protection -- Noriswadi Ismail, Selected Technologies’ Appraisal from The PDPA 2010’s Lens -- Noriswadi Ismail, Acclaiming Accountability. Preaching Best Practices -- Eduardo Ustaran, The Scope of Application of EU Data Protection Law And its Extraterritorial Reach -- Eva Rose Rahim, Information Security In The Internet Age -- Indirani Viknaraja, Data Protection and Local Authorities in the United Kingdom -- Dan Manolescu, Data Protection Enforcement: The European Experience – Case Law -- Philipp E. Fischer, Data Protection Audit – The German Experience -- Noriswadi Ismail/Edwin Lee Yong Cieh, Concluding Remarks. |
Record Nr. | UNINA-9910438231003321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Big Data in Context : Legal, Social and Technological Insights / / edited by Thomas Hoeren, Barbara Kolany-Raiser |
Autore | Hoeren Thomas |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 120 p.) |
Disciplina | 343.099 |
Collana | SpringerBriefs in Law |
Soggetto topico |
Information technology - Law and legislation
Mass media - Law and legislation Quantitative research Data mining Law - Europe Computers - Law and legislation IT Law, Media Law, Intellectual Property Data Analysis and Big Data Data Mining and Knowledge Discovery European Law Legal Aspects of Computing |
ISBN | 3-319-62461-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Thomas Hoeren, Big Data and Data Quality -- Christian Döpke, The Importance of Big Data for Jurisprudence and Legal Practice -- Nicolai Culik and Christian Döpke, About Forgetting and Being Forgotten -- Nicolai Culik, Brussels Calling: Big Data and Privacy -- Andreas Börding, Safe Harbor: The Decision of the European Court of Justice -- Tim Jülicher, Education 2.0: Learning Analytics, Educational Data Mining and Co. -- Max v. Schönfeld, Big Data and Automotive – A Legal Approach -- Stefanie Eschholz and Jonathan Djabbarpour, Big Data and Scoring in the Financial Sector -- Charlotte Röttgen, Like or Dislike – Web Tracking -- Tim Jülicher and Marc Delisle, Step into “The Circle” – A Close Look at Wearables and Quantified Self -- Max v. Schönfeld and Nils Wehkamp, Big Data and Smart Grid -- Max v. Schönfeld, Reinhard Heil and Laura Bittner, Big Data on a Farm – Smart Farming. |
Record Nr. | UNINA-9910231244803321 |
Hoeren Thomas | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Big Digital Forensic Data [[electronic resource] ] : Volume 1: Data Reduction Framework and Selective Imaging / / by Darren Quick, Kim-Kwang Raymond Choo |
Autore | Quick Darren |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (109 pages) |
Disciplina | 363.25968 |
Collana | SpringerBriefs on Cyber Security Systems and Networks |
Soggetto topico |
Computer security
Application software Forensic science Computers Law and legislation Systems and Data Security Information Systems Applications (incl. Internet) Forensic Science Legal Aspects of Computing Computer Appl. in Social and Behavioral Sciences |
ISBN | 981-10-7763-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1 Introduction -- Chapter 2 Background and Literature Review -- Chapter 3 Data Reduction and Data Mining Framework -- Chapter 4 Digital Forensic Data Reduction by Selective Imaging -- Chapter 5 Summary of the Framework and DRbSI. |
Record Nr. | UNINA-9910299287503321 |
Quick Darren | ||
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|