The Right to Privacy 1914–1948 [[electronic resource] ] : The Lost Years / / by Megan Richardson |
Autore | Richardson Megan |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (62 pages) |
Disciplina | 810 |
Collana | SpringerBriefs in Law |
Soggetto topico |
Data protection - Law and legislation
Data protection Private international law Conflict of laws International law Comparative law Human rights Information technology - Law and legislation Mass media - Law and legislation Privacy Data and Information Security Private International Law, International and Foreign Law, Comparative Law Human Rights IT Law, Media Law, Intellectual Property |
ISBN | 981-9944-98-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction -- Chapter 2. Reimagining Privacy in the Face of Modernism -- Chapter 3. Asking for Data Rights in The Castle -- Chapter 4. Resisting Cinematographic Mechanism -- Chapter 5. Reappraisal. |
Record Nr. | UNINA-9910736001503321 |
Richardson Megan
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The secret history of domesticity [[electronic resource] ] : public, private, and the division of knowledge / / Michael McKeon |
Autore | McKeon Michael <1943-> |
Pubbl/distr/stampa | Baltimore, : Johns Hopkins University Press, 2005 |
Descrizione fisica | 1 online resource (918 p.) |
Disciplina | 306.4/2 |
Soggetto topico |
Knowledge, Sociology of
Material culture Privacy Conduct of life Social history Civilization, Modern Privacy - England - History Privacy in literature |
Soggetto genere / forma | Electronic books. |
ISBN | 0-8018-9645-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910456296303321 |
McKeon Michael <1943->
![]() |
||
Baltimore, : Johns Hopkins University Press, 2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The secret history of domesticity [[electronic resource] ] : public, private, and the division of knowledge / / Michael McKeon |
Autore | McKeon Michael <1943-> |
Pubbl/distr/stampa | Baltimore, : Johns Hopkins University Press, 2005 |
Descrizione fisica | 1 online resource (918 p.) |
Disciplina | 306.4/2 |
Soggetto topico |
Knowledge, Sociology of
Material culture Privacy Conduct of life Social history Civilization, Modern Privacy - England - History Privacy in literature |
ISBN | 0-8018-9645-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910780854103321 |
McKeon Michael <1943->
![]() |
||
Baltimore, : Johns Hopkins University Press, 2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The secret history of domesticity [[electronic resource] ] : public, private, and the division of knowledge / / Michael McKeon |
Autore | McKeon Michael <1943-> |
Pubbl/distr/stampa | Baltimore, : Johns Hopkins University Press, 2005 |
Descrizione fisica | 1 online resource (918 p.) |
Disciplina | 306.4/2 |
Soggetto topico |
Knowledge, Sociology of
Material culture Privacy Conduct of life Social history Civilization, Modern Privacy - England - History Privacy in literature |
ISBN | 0-8018-9645-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910828409503321 |
McKeon Michael <1943->
![]() |
||
Baltimore, : Johns Hopkins University Press, 2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure and Resilient Digital Transformation of Healthcare [[electronic resource] ] : First Workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings / / edited by Habtamu Abie, Vasileios Gkioulos, Sokratis Katsikas, Sandeep Pirbhulal |
Autore | Abie Habtamu |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (116 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
GkioulosVasileios
KatsikasSokratis PirbhulalSandeep |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Data protection - Law and legislation Artificial Intelligence Privacy |
ISBN | 3-031-55829-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cybersecurity Skills and Access Control in Healthcare -- Privacy Risks, and Resilience in Healthcare Systems -- Invited Papers from Keynotes. |
Record Nr. | UNINA-9910845091403321 |
Abie Habtamu
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure Voice Processing Systems against Malicious Voice Attacks [[electronic resource] /] / by Kun Sun, Shu Wang |
Autore | Sun Kun |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (122 pages) |
Disciplina |
005.8
323.448 |
Altri autori (Persone) | WangShu |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Data protection - Law and legislation
Biometric identification Privacy Biometrics |
ISBN | 3-031-44748-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Introduction -- 1.1 Overview -- 1.2 Background -- 1.2.1 Audio Signal Processing -- 1.2.2 Voice Processing Systems -- 1.2.3 Attacks on Speaker Verification Systems -- 1.2.4 Attacks on Speech Recognition Systems -- 1.3 Book Structure -- References . . -- 2 Modulated Audio Replay Attack and Dual-Domain Defense -- 2.1 Introduction -- 2.2 Modulated Replay Attacks -- 2.2.1 Impacts of Replay Components -- 2.2.2 Attack Overview -- 2.2.3 Modulation Processor -- 2.2.4 Inverse Filter Estimation -- 2.2.5 Spectrum Processing -- 2.3 Countermeasure: Dual-domain Detection -- 2.3.1 Defense Overview -- 2.3.2 Time-domain Defense -- 2.3.3 Frequency-domain Defense -- 2.3.4 Security Analysis -- 2.4 Evaluation -- -- 2.4.1 Experiment Setup -- -- 2.4.2 Effectiveness of Modulated Replay Attacks -- 2.4.3 Effectiveness of Dual-Domain Detection -- 2.4.4 Robustness of Dual-Domain Detection -- 2.4.5 Overhead of Dual-Domain Detection -- 2.5 Conclusion -- -- Appendix 2.A: Mathematical Proof of Ringing Artifacts in Modulated Replay Audio -- -- Appendix 2.B: Parameters in Detection Methods -- Appendix 2.C: Inverse Filter Implementation -- Appendix 2.D: Classifiers in Time-Domain Defense -- References -- 3 Secure Voice Processing Systems for Driverless Vehicles -- 3.1 Introduction -- 3.2 Threat Model and Assumptions -- 3.3 System Design -- 3.3.1 System Overview -- 3.3.2 Detecting Multiple Speakers -- 3.3.3 Identifying Human Voice -- 3.3.4 Identifying Driver’s Voice -- 3.4 Experimental Results -- 3.4.1 Accuracy on Detecting Multiple Speakers -- 3.4.2 Accuracy on Detecting Human Voice -- 3.4.3 Accuracy on Detecting Driver’s Voice -- 3.4.4 System Robustness -- 3.4.5 Performance Overhead -- 3.5 Discussions -- 3.6 Conclusion -- References -- 4 Acoustic Compensation System against Adversarial Voice Recognition -- 4.1 Introduction -- 4.2 Threat Model -- 4.2.1 Spectrum Reduction Attack -- 4.2.2 Threat Hypothesis -- 4.3 System Design -- 4.3.1 Overview -- 4.3.2 Spectrum Compensation Module -- 4.3.3 Noise Addition Module -- 4.3.4 Adaptation Module -- 4.4 Evaluations -- 4.4.1 Experiment Setup -- 4.4.2 ACE Evaluation -- 4.4.3 Spectrum Compensation Module Evaluation -- 4.4.4 Noise Addition Module Evaluation -- 4.4.5 Adaptation Module Evaluation -- 4.4.6 Overhead -- 4.5 Residual Error Analysis -- 4.5.1 Types of ASR Inference Errors -- 4.5.2 Error Composition Analysis -- 4.6 Discussions -- 4.6.1 Multipath Effect and Audio Quality Improvement -- 4.6.2 Usability -- 4.6.3 Countering Attack Variants -- 4.6.4 Limitations -- 4.7 Conclusion -- Appendix 4.A: Echo Module -- Appendix 4.B: ACE Performance tested with CMU Sphinx -- Appendix 4.C: ACE Performance against Attack Variants -- References -- 5 Conclusion and Future Work -- 5.1 Conclusion -- 5.2 Future Work -- References. |
Record Nr. | UNINA-9910760295803321 |
Sun Kun
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Privacy Trends in the Industrial Internet of Things [[electronic resource] /] / edited by Cristina Alcaraz |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (310 pages) : illustrations |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
Public safety Computer crimes System safety Systems and Data Security Privacy Crime Control and Security Cybercrime Security Science and Technology |
ISBN |
9783030123307
3030123308 9783030123291 3030123294 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1. Security Analysis and Advanced Threats -- Securing industrial Control Systems -- Towards a Secure Industrial Internet of Things -- Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things -- Part 2. Secure Interconnection Mechanisms -- A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT -- Access Control in the Industrial Internet of Things -- A Distributed Usage Control Framework for Industrial Internet of Things -- Part 3. Advanced Protection Techniques -- Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detectionl -- Improving Security in Industrial Internet of Things: a Distributed Intrusion Detection Methodology -- Who’s there? Evaluating data source integrity and veracity in IIoT using Multivariate Statistical Process Control -- Secure Machine to Machine Communication in Industrial Internet of Things -- Part 4. Privacy Issues in Industrial Connected Networks -- Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things -- Security and Privacy Techniques for the Industrial Internet of Thing -- Part 5. Application Scenarios -- IIoT in the Hospital scenario: Hospital 4.0, Blockchain and Robust Data Management -- Design and Realization of Testbeds for Security Research in the Industrial Internet of Things. |
Record Nr. | UNINA-9910337843803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Risk Analysis for Intelligent Edge Computing [[electronic resource] /] / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (244 pages) |
Disciplina | 005.8 |
Collana | Advances in Information Security |
Soggetto topico |
Computer networks
Data protection - Law and legislation Machine learning Cryptography Data encryption (Computer science) Computer Communication Networks Privacy Machine Learning Cryptology |
ISBN | 3-031-28150-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chap I Introduction to Cloud/Edge Computing -- Chap II Big Data Analytics and Security over the Cloud: Characteristics, Analytics, Integration and Security -- Chap III Federated Learning enabled Edge computing -- security for Internet of Medical Things: Concepts, Challenges and Open issues -- Chap IV Embedded Edge and Cloud Intelligence -- Chap V The Analysis on Impact of Cyber Security Threats on Smart Grids -- Chap VI Intelligent Intrusion Detection algorithm based on multi-attack for Edge-Assisted Internet of Things -- Chap VII Secure Data Analysis and Data Privacy -- Chap VIII A Novel Trust evaluation and Reputation data Management based Security System Model for Mobile Edge Computing Network -- Chap IX Network Security System in Mobile Edge Computing-to-IoMT Networks using Distributed Approach -- Chap X Wireless and Mobile Security in Edge Computing -- Chap XI An intelligent facial expression recognizer using modified 1 ResNet-110 using Edge Computing -- Chap XII Blockchain Based Simulated Virtual Machine Placement Hybrid Approach for Decentralized cloud and edge computing environment and Edge Computing. |
Record Nr. | UNINA-9910734830203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Risk Analysis for Intelligent Edge Computing [[electronic resource] /] / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (244 pages) |
Disciplina | 005.8 |
Collana | Advances in Information Security |
Soggetto topico |
Computer networks
Data protection - Law and legislation Machine learning Cryptography Data encryption (Computer science) Computer Communication Networks Privacy Machine Learning Cryptology |
ISBN | 3-031-28150-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chap I Introduction to Cloud/Edge Computing -- Chap II Big Data Analytics and Security over the Cloud: Characteristics, Analytics, Integration and Security -- Chap III Federated Learning enabled Edge computing -- security for Internet of Medical Things: Concepts, Challenges and Open issues -- Chap IV Embedded Edge and Cloud Intelligence -- Chap V The Analysis on Impact of Cyber Security Threats on Smart Grids -- Chap VI Intelligent Intrusion Detection algorithm based on multi-attack for Edge-Assisted Internet of Things -- Chap VII Secure Data Analysis and Data Privacy -- Chap VIII A Novel Trust evaluation and Reputation data Management based Security System Model for Mobile Edge Computing Network -- Chap IX Network Security System in Mobile Edge Computing-to-IoMT Networks using Distributed Approach -- Chap X Wireless and Mobile Security in Edge Computing -- Chap XI An intelligent facial expression recognizer using modified 1 ResNet-110 using Edge Computing -- Chap XII Blockchain Based Simulated Virtual Machine Placement Hybrid Approach for Decentralized cloud and edge computing environment and Edge Computing. |
Record Nr. | UNISA-996546823403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security Rights in Intellectual Property [[electronic resource] /] / edited by Eva-Maria Kieninger |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (711 pages) |
Disciplina | 346.048 |
Collana | Ius Comparatum - Global Studies in Comparative Law |
Soggetto topico |
Mass media
Law Computer security Computers Law and legislation IT Law, Media Law, Intellectual Property Privacy Legal Aspects of Computing |
ISBN | 3-030-44191-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Rights in Intellectual Property: General Report -- Security Rights in Intellectual Property in Australia -- Security Rights in Intellectual Property in Austria -- Security Rights in Intellectual Property in Belgium -- Security Rights in Intellectual Property in Brazil -- Security Rights In Intellectual Property In Canada: Common Law -- Les sûretés sur la propriété intellectuelle au Québec (Canada) -- Security Rights in Intellectual Property in Croatia -- Security Rights in Intellectual Property in the Czech Republic -- Security Rights in Intellectual Property in Cyprus -- Security Rights in Intellectual Property in England and Wales -- Security Rights in Intellectual Property in Finland -- Security Rights in Intellectual Property in France -- Security Rights in Intellectual Property in Germany -- Security Rights in Intellectual Property in Greece -- Security Rights in Intellectual Property in Italy -- Security Rights in Intellectual Property in Japan -- Security Rights in Intellectual Property in Mexico -- Security Rights in Intellectual Property in the Netherlands -- Security Rights in Intellectual Property in Poland -- Security Rights in Intellectual Property in Romania -- Security Rights in Intellectual Property in Scotland -- Security Rights in Intellectual Property in South Africa -- Security Rights in Intellectual Property in Spain. |
Record Nr. | UNINA-9910410025603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|