top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The Right to Privacy 1914–1948 [[electronic resource] ] : The Lost Years / / by Megan Richardson
The Right to Privacy 1914–1948 [[electronic resource] ] : The Lost Years / / by Megan Richardson
Autore Richardson Megan
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (62 pages)
Disciplina 810
Collana SpringerBriefs in Law
Soggetto topico Data protection - Law and legislation
Data protection
Private international law
Conflict of laws
International law
Comparative law
Human rights
Information technology - Law and legislation
Mass media - Law and legislation
Privacy
Data and Information Security
Private International Law, International and Foreign Law, Comparative Law
Human Rights
IT Law, Media Law, Intellectual Property
ISBN 981-9944-98-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Chapter 2. Reimagining Privacy in the Face of Modernism -- Chapter 3. Asking for Data Rights in The Castle -- Chapter 4. Resisting Cinematographic Mechanism -- Chapter 5. Reappraisal.
Record Nr. UNINA-9910736001503321
Richardson Megan  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The secret history of domesticity [[electronic resource] ] : public, private, and the division of knowledge / / Michael McKeon
The secret history of domesticity [[electronic resource] ] : public, private, and the division of knowledge / / Michael McKeon
Autore McKeon Michael <1943->
Pubbl/distr/stampa Baltimore, : Johns Hopkins University Press, 2005
Descrizione fisica 1 online resource (918 p.)
Disciplina 306.4/2
Soggetto topico Knowledge, Sociology of
Material culture
Privacy
Conduct of life
Social history
Civilization, Modern
Privacy - England - History
Privacy in literature
Soggetto genere / forma Electronic books.
ISBN 0-8018-9645-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910456296303321
McKeon Michael <1943->  
Baltimore, : Johns Hopkins University Press, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The secret history of domesticity [[electronic resource] ] : public, private, and the division of knowledge / / Michael McKeon
The secret history of domesticity [[electronic resource] ] : public, private, and the division of knowledge / / Michael McKeon
Autore McKeon Michael <1943->
Pubbl/distr/stampa Baltimore, : Johns Hopkins University Press, 2005
Descrizione fisica 1 online resource (918 p.)
Disciplina 306.4/2
Soggetto topico Knowledge, Sociology of
Material culture
Privacy
Conduct of life
Social history
Civilization, Modern
Privacy - England - History
Privacy in literature
ISBN 0-8018-9645-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910780854103321
McKeon Michael <1943->  
Baltimore, : Johns Hopkins University Press, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The secret history of domesticity [[electronic resource] ] : public, private, and the division of knowledge / / Michael McKeon
The secret history of domesticity [[electronic resource] ] : public, private, and the division of knowledge / / Michael McKeon
Autore McKeon Michael <1943->
Pubbl/distr/stampa Baltimore, : Johns Hopkins University Press, 2005
Descrizione fisica 1 online resource (918 p.)
Disciplina 306.4/2
Soggetto topico Knowledge, Sociology of
Material culture
Privacy
Conduct of life
Social history
Civilization, Modern
Privacy - England - History
Privacy in literature
ISBN 0-8018-9645-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910828409503321
McKeon Michael <1943->  
Baltimore, : Johns Hopkins University Press, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure and Resilient Digital Transformation of Healthcare [[electronic resource] ] : First Workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings / / edited by Habtamu Abie, Vasileios Gkioulos, Sokratis Katsikas, Sandeep Pirbhulal
Secure and Resilient Digital Transformation of Healthcare [[electronic resource] ] : First Workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings / / edited by Habtamu Abie, Vasileios Gkioulos, Sokratis Katsikas, Sandeep Pirbhulal
Autore Abie Habtamu
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (116 pages)
Disciplina 006.3
Altri autori (Persone) GkioulosVasileios
KatsikasSokratis
PirbhulalSandeep
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Data protection - Law and legislation
Artificial Intelligence
Privacy
ISBN 3-031-55829-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cybersecurity Skills and Access Control in Healthcare -- Privacy Risks, and Resilience in Healthcare Systems -- Invited Papers from Keynotes.
Record Nr. UNINA-9910845091403321
Abie Habtamu  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure Voice Processing Systems against Malicious Voice Attacks [[electronic resource] /] / by Kun Sun, Shu Wang
Secure Voice Processing Systems against Malicious Voice Attacks [[electronic resource] /] / by Kun Sun, Shu Wang
Autore Sun Kun
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (122 pages)
Disciplina 005.8
323.448
Altri autori (Persone) WangShu
Collana SpringerBriefs in Computer Science
Soggetto topico Data protection - Law and legislation
Biometric identification
Privacy
Biometrics
ISBN 3-031-44748-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Introduction -- 1.1 Overview -- 1.2 Background -- 1.2.1 Audio Signal Processing -- 1.2.2 Voice Processing Systems -- 1.2.3 Attacks on Speaker Verification Systems -- 1.2.4 Attacks on Speech Recognition Systems -- 1.3 Book Structure -- References . . -- 2 Modulated Audio Replay Attack and Dual-Domain Defense -- 2.1 Introduction -- 2.2 Modulated Replay Attacks -- 2.2.1 Impacts of Replay Components -- 2.2.2 Attack Overview -- 2.2.3 Modulation Processor -- 2.2.4 Inverse Filter Estimation -- 2.2.5 Spectrum Processing -- 2.3 Countermeasure: Dual-domain Detection -- 2.3.1 Defense Overview -- 2.3.2 Time-domain Defense -- 2.3.3 Frequency-domain Defense -- 2.3.4 Security Analysis -- 2.4 Evaluation -- -- 2.4.1 Experiment Setup -- -- 2.4.2 Effectiveness of Modulated Replay Attacks -- 2.4.3 Effectiveness of Dual-Domain Detection -- 2.4.4 Robustness of Dual-Domain Detection -- 2.4.5 Overhead of Dual-Domain Detection -- 2.5 Conclusion -- -- Appendix 2.A: Mathematical Proof of Ringing Artifacts in Modulated Replay Audio -- -- Appendix 2.B: Parameters in Detection Methods -- Appendix 2.C: Inverse Filter Implementation -- Appendix 2.D: Classifiers in Time-Domain Defense -- References -- 3 Secure Voice Processing Systems for Driverless Vehicles -- 3.1 Introduction -- 3.2 Threat Model and Assumptions -- 3.3 System Design -- 3.3.1 System Overview -- 3.3.2 Detecting Multiple Speakers -- 3.3.3 Identifying Human Voice -- 3.3.4 Identifying Driver’s Voice -- 3.4 Experimental Results -- 3.4.1 Accuracy on Detecting Multiple Speakers -- 3.4.2 Accuracy on Detecting Human Voice -- 3.4.3 Accuracy on Detecting Driver’s Voice -- 3.4.4 System Robustness -- 3.4.5 Performance Overhead -- 3.5 Discussions -- 3.6 Conclusion -- References -- 4 Acoustic Compensation System against Adversarial Voice Recognition -- 4.1 Introduction -- 4.2 Threat Model -- 4.2.1 Spectrum Reduction Attack -- 4.2.2 Threat Hypothesis -- 4.3 System Design -- 4.3.1 Overview -- 4.3.2 Spectrum Compensation Module -- 4.3.3 Noise Addition Module -- 4.3.4 Adaptation Module -- 4.4 Evaluations -- 4.4.1 Experiment Setup -- 4.4.2 ACE Evaluation -- 4.4.3 Spectrum Compensation Module Evaluation -- 4.4.4 Noise Addition Module Evaluation -- 4.4.5 Adaptation Module Evaluation -- 4.4.6 Overhead -- 4.5 Residual Error Analysis -- 4.5.1 Types of ASR Inference Errors -- 4.5.2 Error Composition Analysis -- 4.6 Discussions -- 4.6.1 Multipath Effect and Audio Quality Improvement -- 4.6.2 Usability -- 4.6.3 Countering Attack Variants -- 4.6.4 Limitations -- 4.7 Conclusion -- Appendix 4.A: Echo Module -- Appendix 4.B: ACE Performance tested with CMU Sphinx -- Appendix 4.C: ACE Performance against Attack Variants -- References -- 5 Conclusion and Future Work -- 5.1 Conclusion -- 5.2 Future Work -- References.
Record Nr. UNINA-9910760295803321
Sun Kun  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy Trends in the Industrial Internet of Things [[electronic resource] /] / edited by Cristina Alcaraz
Security and Privacy Trends in the Industrial Internet of Things [[electronic resource] /] / edited by Cristina Alcaraz
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (310 pages) : illustrations
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer security
Public safety
Computer crimes
System safety
Systems and Data Security
Privacy
Crime Control and Security
Cybercrime
Security Science and Technology
ISBN 9783030123307
3030123308
9783030123291
3030123294
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Security Analysis and Advanced Threats -- Securing industrial Control Systems -- Towards a Secure Industrial Internet of Things -- Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things -- Part 2. Secure Interconnection Mechanisms -- A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT -- Access Control in the Industrial Internet of Things -- A Distributed Usage Control Framework for Industrial Internet of Things -- Part 3. Advanced Protection Techniques -- Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detectionl -- Improving Security in Industrial Internet of Things: a Distributed Intrusion Detection Methodology -- Who’s there? Evaluating data source integrity and veracity in IIoT using Multivariate Statistical Process Control -- Secure Machine to Machine Communication in Industrial Internet of Things -- Part 4. Privacy Issues in Industrial Connected Networks -- Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things -- Security and Privacy Techniques for the Industrial Internet of Thing -- Part 5. Application Scenarios -- IIoT in the Hospital scenario: Hospital 4.0, Blockchain and Robust Data Management -- Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
Record Nr. UNINA-9910337843803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Risk Analysis for Intelligent Edge Computing [[electronic resource] /] / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
Security and Risk Analysis for Intelligent Edge Computing [[electronic resource] /] / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (244 pages)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Computer networks
Data protection - Law and legislation
Machine learning
Cryptography
Data encryption (Computer science)
Computer Communication Networks
Privacy
Machine Learning
Cryptology
ISBN 3-031-28150-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chap I Introduction to Cloud/Edge Computing -- Chap II Big Data Analytics and Security over the Cloud: Characteristics, Analytics, Integration and Security -- Chap III Federated Learning enabled Edge computing -- security for Internet of Medical Things: Concepts, Challenges and Open issues -- Chap IV Embedded Edge and Cloud Intelligence -- Chap V The Analysis on Impact of Cyber Security Threats on Smart Grids -- Chap VI Intelligent Intrusion Detection algorithm based on multi-attack for Edge-Assisted Internet of Things -- Chap VII Secure Data Analysis and Data Privacy -- Chap VIII A Novel Trust evaluation and Reputation data Management based Security System Model for Mobile Edge Computing Network -- Chap IX Network Security System in Mobile Edge Computing-to-IoMT Networks using Distributed Approach -- Chap X Wireless and Mobile Security in Edge Computing -- Chap XI An intelligent facial expression recognizer using modified 1 ResNet-110 using Edge Computing -- Chap XII Blockchain Based Simulated Virtual Machine Placement Hybrid Approach for Decentralized cloud and edge computing environment and Edge Computing.
Record Nr. UNINA-9910734830203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Risk Analysis for Intelligent Edge Computing [[electronic resource] /] / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
Security and Risk Analysis for Intelligent Edge Computing [[electronic resource] /] / edited by Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (244 pages)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Computer networks
Data protection - Law and legislation
Machine learning
Cryptography
Data encryption (Computer science)
Computer Communication Networks
Privacy
Machine Learning
Cryptology
ISBN 3-031-28150-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chap I Introduction to Cloud/Edge Computing -- Chap II Big Data Analytics and Security over the Cloud: Characteristics, Analytics, Integration and Security -- Chap III Federated Learning enabled Edge computing -- security for Internet of Medical Things: Concepts, Challenges and Open issues -- Chap IV Embedded Edge and Cloud Intelligence -- Chap V The Analysis on Impact of Cyber Security Threats on Smart Grids -- Chap VI Intelligent Intrusion Detection algorithm based on multi-attack for Edge-Assisted Internet of Things -- Chap VII Secure Data Analysis and Data Privacy -- Chap VIII A Novel Trust evaluation and Reputation data Management based Security System Model for Mobile Edge Computing Network -- Chap IX Network Security System in Mobile Edge Computing-to-IoMT Networks using Distributed Approach -- Chap X Wireless and Mobile Security in Edge Computing -- Chap XI An intelligent facial expression recognizer using modified 1 ResNet-110 using Edge Computing -- Chap XII Blockchain Based Simulated Virtual Machine Placement Hybrid Approach for Decentralized cloud and edge computing environment and Edge Computing.
Record Nr. UNISA-996546823403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security Rights in Intellectual Property [[electronic resource] /] / edited by Eva-Maria Kieninger
Security Rights in Intellectual Property [[electronic resource] /] / edited by Eva-Maria Kieninger
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (711 pages)
Disciplina 346.048
Collana Ius Comparatum - Global Studies in Comparative Law
Soggetto topico Mass media
Law
Computer security
Computers
Law and legislation
IT Law, Media Law, Intellectual Property
Privacy
Legal Aspects of Computing
ISBN 3-030-44191-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Rights in Intellectual Property: General Report -- Security Rights in Intellectual Property in Australia -- Security Rights in Intellectual Property in Austria -- Security Rights in Intellectual Property in Belgium -- Security Rights in Intellectual Property in Brazil -- Security Rights In Intellectual Property In Canada: Common Law -- Les sûretés sur la propriété intellectuelle au Québec (Canada) -- Security Rights in Intellectual Property in Croatia -- Security Rights in Intellectual Property in the Czech Republic -- Security Rights in Intellectual Property in Cyprus -- Security Rights in Intellectual Property in England and Wales -- Security Rights in Intellectual Property in Finland -- Security Rights in Intellectual Property in France -- Security Rights in Intellectual Property in Germany -- Security Rights in Intellectual Property in Greece -- Security Rights in Intellectual Property in Italy -- Security Rights in Intellectual Property in Japan -- Security Rights in Intellectual Property in Mexico -- Security Rights in Intellectual Property in the Netherlands -- Security Rights in Intellectual Property in Poland -- Security Rights in Intellectual Property in Romania -- Security Rights in Intellectual Property in Scotland -- Security Rights in Intellectual Property in South Africa -- Security Rights in Intellectual Property in Spain.
Record Nr. UNINA-9910410025603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...