top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Database Systems for Advanced Applications [[electronic resource] ] : DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22–25, 2019, Proceedings / / edited by Guoliang Li, Jun Yang, Joao Gama, Juggapong Natwichai, Yongxin Tong
Database Systems for Advanced Applications [[electronic resource] ] : DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22–25, 2019, Proceedings / / edited by Guoliang Li, Jun Yang, Joao Gama, Juggapong Natwichai, Yongxin Tong
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXI, 607 p. 241 illus., 154 illus. in color.)
Disciplina 005.7565
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Database management
Data mining
Application software
Artificial intelligence
Computer communication systems
Data protection
Database Management
Data Mining and Knowledge Discovery
Information Systems Applications (incl. Internet)
Artificial Intelligence
Computer Communication Networks
Security
ISBN 3-030-18590-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The 6th International Workshop on Big Data Management and Service (BDSM 2019) -- A Probabilistic Approach for Inferring Latent Entity Associations in Textual Web Contents -- UHRP Uncertainty-Based Pruning Method for Anonymized Data Linear Regression -- Meta-path based MiRNA-disease Association Prediction -- Medical Question Retrieval based on Siamese Neural Network and Transfer learning method -- An adaptive Kalman filter based Ocean Wave Prediction Model using Motion Reference Unit Data -- ASLM: Adaptive Single Layer Model for Learned Index -- SparseMAAC: Sparse Attention for Multi-Agent Reinforcement Learning -- The 4th International Workshop on Big Data Quality Management (BDQM 2019) -- Identifying Reference Relationship of Desktop Files Based on Access Logs -- Visualization of Photo Album: Selecting a Representative Photo of a Specific Event -- Data Quality Management in Institutional Research Output Data Center -- Generalized Bayesian Structure Learning from Noisy Datasets -- The Third International Workshop on Graph Data Management and Analysis (GDMA 2019) -- ANDMC: An Algorithm for Author Name Disambiguation Based on Molecular Cross Clustering -- Graph Based Aspect Extraction and Rating Classification of Customer Review Data -- Streaming Massive Electric Power Data Analysis Based on Spark Streaming -- Short Papers -- Deletion Robust k-Coverage Queries -- Episodic Memory Network with Self-Attention for Emotion Detection -- Detecting Suicidal Ideation with Data Protection in Online Communities -- Hierarchical Conceptual Labeling -- Anomaly Detection in Time-Evolving Attributed Networks -- A Multi-task Learning Framework for Automatic Early Detection of Alzheimer’s -- Top-k Spatial Keyword Query with Typicality and Semantics -- Align Reviews with Topics in Attention Network for Rating Prediction -- PSMSP: A Parallelized Sampling-based Approach for Mining Top-k Sequential Patterns in Database Graphs -- Value-Oriented Ranking of Online Reviews Based on Reviewer-influenced Graph -- Ancient Chinese Landscape Painting Composition Classification by Using Semantic Variational Autoencoder -- Learning Time-Aware Distributed Representations of Locations from Spatio-Temporal Trajectories -- Hyper2vec: Biased Random Walk for Hyper-Network Embedding -- Privacy-preserving and dynamic spatial range aggregation query processing in wireless sensor networks -- Adversarial Discriminative Denoising for Distant Supervision Relation Extraction -- Nonnegative Spectral Clustering for Large-Scale Semi-Supervised Learning -- Distributed PARAFAC Decomposition Method based on In-Memory Big Data System -- GPU-Accelerated Dynamic Graph Coloring -- Relevance-based Entity Embedding -- An Iterative Map-Trajectory Co-Optimisation Framework Based on Map-Matching and Map Update -- Exploring Regularity in Traditional Chinese Medicine Clinical Data Using Heterogeneous Weighted Networks Embedding -- AGREE: Attentive Tour Group Recommendation with Multi-Modal Data -- Random Decision DAG: An Entropy Based Compression Approach for Random Forest -- Generating Behavior Features for Cold-Start Spam Review Detection -- TCL: Tensor-CNN-LSTM for Travel Time Prediction with Sparse Trajectory Data -- A Semi-supervised Classification Approach for Multiple Time-varying Networks with Total Variation -- Multidimensional Skylines Over Streaming Data -- A domain adaptation approach for multistream classification -- Gradient Boosting Censored Regression for Winning Price Prediction in Real-Time Bidding -- Deep Sequential Multi-task Modeling for Next Check-in Time and Location Prediction -- SemiSync: Semi-supervised Clustering by Synchronization -- Neural Review Rating Prediction with Hierarchical Attentions and Latent Factors -- MVS-match: An Efficient Subsequence Matching Approach Based on the Series Synopsis -- Temporal-Spatial Recommendation for On-demand Cinemas -- Finding the key influences on the house price by Finite Mixture Model based on the real estate data in Changchun -- Semi-supervised Clustering with Deep Metric Learning -- Spatial Bottleneck Minimum Task Assignment with Time-delay -- A Mimic Learning Method for Disease Risk Prediction with Incomplete Initial Data -- Hospitalization Behavior Prediction Based on Attention and Time Adjustment Factors in Bidirectional LSTM -- Modeling Item Category for Effective Recommendation -- Distributed Reachability Queries on Massive Graphs -- Edge-Based Shortest Path Caching in Road Networks -- Extracting Definitions and Hypernyms with a Two-Phase Framework -- Tag Recommendation by Word-Level Tag Sequence Modeling -- A New Statistics Collecting Method with Adaptive Strategy -- Word Sense Disambiguation with Massive Contextual Texts -- Learning DMEs from Positive and Negative Examples -- Serial and Parallel Recurrent Convolutional Neural Networks for Biomedical Named Entity Recognition -- DRGAN: A GAN-based Framework for Doctor Recommendation in Chinese On-line QA Communities -- Attention-based Abnormal-Aware Fusion Network for Radiology Report Generation -- LearningTour: A Machine Learning Approach for Tour Recommendation based on Users’ Historical Travel Experience -- TF-Miner: Topic-specific Facet Mining by Label Propagation -- Fast Raft Replication for Transactional Database Systems over Unreliable Networks -- Parallelizing Big De Bruijn Graph Traversal for Genome Assembly on GPU Clusters -- GScan: Exploiting Sequential Scans for Subgraph Matching -- SIMD Accelerates the Probe Phase of Star Joins in Main Memory Databases -- A Deep Recommendation Model Incorporating Adaptive Knowledge-based Representations -- BLOMA: Explain Collaborative Filtering via Boosted Local Rank-One Matrix Approximation -- Spatiotemporal-Aware Region Recommendation with Deep Metric Learning -- On the Impact of the Length of Subword Vectors on Word Embeddings -- Using Dilated Residual Network to Model Distant Supervision Relation Extraction -- Modeling More Globally: A Hierarchical Attention Network via Multi-Task Learning for Aspect-Based Sentiment Analysis -- A Sparse Matrix-based Join for SPARQL Query Processing -- Change Point Detection for Streaming High-Dimensional time series -- Demo Papers -- Distributed Query Engine for Multiple-Query Optimization over Data Stream -- Adding Value by Combining Business and Sensor Data: An Industry 4.0 Use Case -- AgriKG: An Agricultural Knowledge Graph and Its Applications -- KGVis: An Interactive Visual Query Language for Knowledge Graphs -- OperaMiner: Extracting Character Relations from Opera Scripts using Deep Neural Networks -- GparMiner: A System to mine Graph Pattern Association Rules -- A Data Publishing System Based on Privacy Preservation -- Privacy as a Service: Publishing Data and Models -- Dynamic Bus Route Adjustment Based on Hot Bus Stop Pair Extraction -- DHDSearch: A Framework for Batch Time Series Searching on MapReduce -- Bus Stop Refinement based on Hot Spot Extraction -- Adaptive Transaction Scheduling for Highly Contended Workloads -- IMOptimizer: An Online Interactive Parameter Optimization System based on Big Data -- Tutorial Papers -- Cohesive Subgraphs with Hierarchical Decomposition on Big Graphs -- Tracking User Behaviours: Laboratory-Based and In-The-Wild User S -- Mining Knowledge Graphs for Vision Tasks -- Enterprise Knowledge Graph From Specific Business Task to Enterprise Knowledge Management -- Knowledge Graph Data Management -- Deep learning for Healthcare Data Processing.
Record Nr. UNISA-996466308403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Datensicherheit [[electronic resource] ] : Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität / / von Thomas H. Lenhard
Datensicherheit [[electronic resource] ] : Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität / / von Thomas H. Lenhard
Autore Lenhard Thomas H
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2017
Descrizione fisica 1 online resource (IX, 109 S. 9 Abb., 2 Abb. in Farbe.)
Disciplina 005.8
Soggetto topico Computer security
Data protection
Systems and Data Security
Security
ISBN 3-658-17983-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Nota di contenuto Datenschutz und Datensicherheit -- Wie Computer miteinander kommunizieren -- Was Datenbeständen zustoßen kann -- Technische Bedrohungen -- Gefährliche Software -- Gefahren durch mobile Datenträger und Geräte -- Telefonanlage als Gefahrenquelle -- Zerstörung von Daten -- Sicherung von Daten -- Verschlüsselung -- Sicherheit von Webseiten -- Häufige Bedrohungen der IT-Sicherheit -- Identifikation von Computern und IP-Adressen -- Firewalls -- Router -- Organisatorischer Datenschutz.
Record Nr. UNINA-9910483530703321
Lenhard Thomas H  
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Deep Biometrics [[electronic resource] /] / edited by Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger
Deep Biometrics [[electronic resource] /] / edited by Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (VIII, 320 p. 118 illus., 99 illus. in color.)
Disciplina 006.4
Collana Unsupervised and Semi-Supervised Learning
Soggetto topico Signal processing
Image processing
Speech processing systems
Data protection
Bioinformatics
Biometrics (Biology)
Signal, Image and Speech Processing
Security
Biometrics
ISBN 3-030-32583-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Part I – New Methods in Biometrics -- Deep Biometrics: A Robust Approach to Biometrics in Big Data Issues -- Deep Fusion of Multimodal Biometrics -- Deep Fuzzy Logic for Precise Biometric Systems -- Hierarchical Biometric Verification with Deep Sparse Features -- GAN-based Deep Biometric Verification -- Part II – New Advances in Deep Biometrics -- Deep Paleographic Handwriting Analysis for Author Identification -- Deep Palmprints versus Fingerprints: Rivals or Friends? -- A Survey on Deep Soft Biometrics for Forensic Analysis -- Robust Biometric Verification with Low Quality Data -- Deep Solution for Biometric Big Data -- Deep Privacy in Biometric -- Part III – New Biometric Applications using Deep Learning -- Biometric Key Generation via Deep Learning for Mobile Banking -- Securing Electronic Medical Records Using Deep Biometric Authentication -- Deep Body Biometrics from MRI Images for Medicine Advice -- Deep Social Identity in Social Network -- Deep Cognition in Robotic Biometrics -- Conclusion.
Record Nr. UNINA-9910373903103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Defending IoT Infrastructures with the Raspberry Pi [[electronic resource] ] : Monitoring and Detecting Nefarious Behavior in Real Time / / by Chet Hosmer
Defending IoT Infrastructures with the Raspberry Pi [[electronic resource] ] : Monitoring and Detecting Nefarious Behavior in Real Time / / by Chet Hosmer
Autore Hosmer Chet
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018
Descrizione fisica 1 online resource (XV, 178 p. 68 illus.)
Disciplina 005.8
Soggetto topico Data protection
Python (Computer program language)
Computer input-output equipment
Security
Python
Hardware and Maker
ISBN 1-4842-3700-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: IoT Vulnerabilities -- Chapter 2: Classifying and Modeling IoT Behavior -- Chapter 3: Raspberry Pi Configuration and PackerRecorder.py Enhancements -- Chapter 4: Raspberry Pi as a Sensor -- Chapter 5: Operating the Raspberry Pi Sensor -- Chapter 6: Adding Finishing Touches -- Chapter 7: Future Considerations -- Appendix: Obtaining the Python Source Code -- Glossary -- .
Record Nr. UNINA-9910300757203321
Hosmer Chet  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Designing a HIPAA-Compliant Security Operations Center [[electronic resource] ] : A Guide to Detecting and Responding to Healthcare Breaches and Events / / by Eric C. Thompson
Designing a HIPAA-Compliant Security Operations Center [[electronic resource] ] : A Guide to Detecting and Responding to Healthcare Breaches and Events / / by Eric C. Thompson
Autore Thompson Eric C
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Descrizione fisica 1 online resource (XVIII, 231 p. 136 illus.)
Disciplina 005.8
Soggetto topico Data protection
Security
ISBN 1-4842-5608-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Security Operations: The Why and the Roadmap -- Chapter 2: HIPAA Security Rule and Cybersecurity Operations -- Chapter 3: Threat Intelligence -- Chapter 4: Vulnerability Management -- Chapter 5: Continuous Monitoring -- Chapter 6: Incident Response -- Chapter 7: Threat Hunting -- Chapter 8: Where to Go from Here.-.
Record Nr. UNINA-9910380726103321
Thompson Eric C  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Developing Applications with Azure Active Directory [[electronic resource] ] : Principles of Authentication and Authorization for Architects and Developers / / by Manas Mayank, Mohit Garg
Developing Applications with Azure Active Directory [[electronic resource] ] : Principles of Authentication and Authorization for Architects and Developers / / by Manas Mayank, Mohit Garg
Autore Mayank Manas
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Descrizione fisica 1 online resource (XVII, 284 p. 104 illus.)
Disciplina 004.165
Soggetto topico Microsoft software
Microsoft .NET Framework
Data protection
Microsoft and .NET
Security
ISBN 1-4842-5040-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction to Azure Active Directory -- Chapter 2: OAuth flows and OpenID Connect -- Chapter 3: User based Authentication for Web Apps -- Chapter 4: User based Authentication for Native Applications -- Chapter 5: Daemon Application Authentication -- Chapter 6: Active Directory Custom Data Extensions -- Chapter 7: Authenticating External Users -- Chapter 8: Multitenancy -- Chapter 9: Introduction to Authorization.
Record Nr. UNINA-9910349527703321
Mayank Manas  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
DevSecOps for .NET Core [[electronic resource] ] : Securing Modern Software Applications / / by Afzaal Ahmad Zeeshan
DevSecOps for .NET Core [[electronic resource] ] : Securing Modern Software Applications / / by Afzaal Ahmad Zeeshan
Autore Zeeshan Afzaal Ahmad
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Descrizione fisica 1 online resource (297 pages) : illustrations
Disciplina 005.8
Soggetto topico Microsoft software
Microsoft .NET Framework
Data protection
Microsoft and .NET
Security
ISBN 1-4842-5850-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Ch1: Modern Software Engineering -- Ch 2: DevOps with Security -- Ch 3: Writing Secure Code -- Ch 4: Automating Everything as Code -- Ch 5: Securing Build Systems for DevOps -- Ch 6: Automating Production Environments for Quality -- Ch 7: Compliance and Security.
Record Nr. UNINA-9910409993803321
Zeeshan Afzaal Ahmad  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Communication. Towards a Smart and Secure Future Internet [[electronic resource] ] : 28th International Tyrrhenian Workshop, TIWDC 2017, Palermo, Italy, September 18-20, 2017, Proceedings / / edited by Alessandro Piva, Ilenia Tinnirello, Simone Morosi
Digital Communication. Towards a Smart and Secure Future Internet [[electronic resource] ] : 28th International Tyrrhenian Workshop, TIWDC 2017, Palermo, Italy, September 18-20, 2017, Proceedings / / edited by Alessandro Piva, Ilenia Tinnirello, Simone Morosi
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 263 p. 98 illus.)
Disciplina 004.678
Collana Communications in Computer and Information Science
Soggetto topico Computer organization
Optical data processing
Application software
Data protection
Biometrics (Biology)
Computer Systems Organization and Communication Networks
Image Processing and Computer Vision
Information Systems Applications (incl. Internet)
Security
Biometrics
ISBN 3-319-67639-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Biometric systems -- On the use of time information at long distance in biometric online signature recognition -- Automatic Face Recognition and Identification Tools in the Forensic Science Domain -- Biometric Fusion for Palm-Vein Based Recognition Systems -- Emerging services with NFV -- Availability Modeling and Evaluation of a Network Service Deployed via NFV -- Definition and Evaluation of Cold Migration Policies for the Minimization of the Energy Consumption in NFV Architectures -- A Lightweight Prediction Method for Scalable Analytics of Multi-Seasonal KPIs -- Multimedia forensics -- A copy-move detection algorithm based on geometric local binary pattern -- A Dataset for forensic analysis of videos in the wild -- Illumination Analysis in Physics-based Image Forensics: A Joint Discussion of Illumination Direction and Color -- Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling -- Security protocols -- A Security Evaluation of FIDO’s UAF Protocol in Mobile and Embedded Devices -- Delay Tolerant Revocation Scheme in Delay Tolerant VANETs -- Impact of Spreading Factor Imperfect Orthogonality in LoRa Communications -- Software Defined Networks -- A Network-Assisted Platform for Multipoint Remote Learning -- A de-verticalizing middleware for IoT systems based on Information Centric Networking design -- Technologies for IoT -- Measuring Spectrum Similarity in Distributed Radio Monitoring Systems -- Green and Heuristics-based Consolidation Scheme for Data Center Cloud Applications -- Implementing a per-flow Token Bucket using Open Packet Processor. .
Record Nr. UNINA-9910254850003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital forensics and cyber crime : 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, proceedings / / Editor, Sanjay Goel [and four others]
Digital forensics and cyber crime : 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, proceedings / / Editor, Sanjay Goel [and four others]
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XII, 251 p. 109 illus., 76 illus. in color.)
Disciplina 060
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Security
Artificial intelligence
ISBN 3-030-68734-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Reliability of JA3 Hashes for Fingerprinting Mobile Applications -- Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations -- Evidence gathering in IoT criminal investigation Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor -- A Partial Approach to Intrusion Detection -- Efficient Fingerprint Matching for Forensic Event Reconstruction -- Modelling GOP structure effects on ENF-based video forensics -- Android Dumpsys Analysis to Indicate Driver Distraction -- Adapting to local conditions: Similarities and differences in anonymous online market between Chinese and English Speaking Communities -- Remote air-gap Live forensics -- A Digital Forensic Approach for Optimizing the Investigation of Hit-And-Run Accidents -- -- An Intelligence Criminal Tracker for Industrial Espionage: Applying Digital Data Acquired Onsite to Target Criminals -- Retracing the Flow of the Stream: Investigating Kodi Streaming Services -- Cybersecurity Methodology for Specialized Behavior Analysis -- Neural Representation Learning Based Binary Code Authorship Attribution.
Record Nr. UNINA-9910483989203321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital forensics and cyber crime : 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, proceedings / / Editor, Sanjay Goel [and four others]
Digital forensics and cyber crime : 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, proceedings / / Editor, Sanjay Goel [and four others]
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XII, 251 p. 109 illus., 76 illus. in color.)
Disciplina 060
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Security
Artificial intelligence
ISBN 3-030-68734-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Reliability of JA3 Hashes for Fingerprinting Mobile Applications -- Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations -- Evidence gathering in IoT criminal investigation Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor -- A Partial Approach to Intrusion Detection -- Efficient Fingerprint Matching for Forensic Event Reconstruction -- Modelling GOP structure effects on ENF-based video forensics -- Android Dumpsys Analysis to Indicate Driver Distraction -- Adapting to local conditions: Similarities and differences in anonymous online market between Chinese and English Speaking Communities -- Remote air-gap Live forensics -- A Digital Forensic Approach for Optimizing the Investigation of Hit-And-Run Accidents -- -- An Intelligence Criminal Tracker for Industrial Espionage: Applying Digital Data Acquired Onsite to Target Criminals -- Retracing the Flow of the Stream: Investigating Kodi Streaming Services -- Cybersecurity Methodology for Specialized Behavior Analysis -- Neural Representation Learning Based Binary Code Authorship Attribution.
Record Nr. UNISA-996464520103316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui