Biosensors for Security and Bioterrorism Applications / / edited by Dimitrios P. Nikolelis, Georgia-Paraskevi Nikoleli |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (514 p.) |
Disciplina | 610.284 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
System safety
Nanotechnology Analytical chemistry Environmental monitoring Electrochemistry Security Science and Technology Analytical Chemistry Monitoring/Environmental Analysis |
ISBN | 3-319-28926-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Biosensors for Security and Bioterrorism: Definitions, History, Types of Agents, New Trends and Applications -- Microfluidics a Potent Route to Sample Delivery for Non-Intrusive Sensors -- New Routes in the High-Throughput Screening of Toxic Proteins Using Immunochemical Tools -- Voltammetric Electronic Tongue for the Sensing of Explosives and its Mixtures -- Magneto Actuated Biosensors for Foodborne Pathogens and Infection Diseases Affecting Global Health -- Electrochemical Biosensors for Chemical Warfare Agents.-Macromolecular Imprinting for Improved Health Security -- Electrochemical DNA Biosensors for Bioterrorism prevention -- Biosensors for the Express Evaluation of the Level of Genotoxicity of Chemical Substances -- Efficiency of Instrumental Analytical Approaches at the Control of Bacterial Infections in Water, Foods and Feeds.-Biosensors for the Detection of Emerging Marine Toxins.-Aptasensor Technologies Developed for Detection of Toxins.-Electrochemical and Acoustic Biosensors based on DNA Aptamers for Detection of Mycotoxins; T. Hianik -- Electrochemical Biosensors for Food Security: Allergens and Adulterants Detection -- Redox Labeling of Nucleic Acids for Electrochemical Analysis of Nucleotide Sequences and DNA Damage -- Biosensing of Neurotoxicity to Prevent Bioterrorist Threats and Harmful Algal Blooms -- Biosensors for Detection of Anticholinesterase Agents -- Efficiency of Non-Label Optical Biosensors for the Express Control of Toxic Agents in Food -- Sensors for Rapid Detection of Environmental Toxicity in Blood of Poisoned People -- Emerging Biosensor for Pesticide Detection -- Label-free Optical Biosensors for Monitoring Cellular Processes and Cytotoxic Agents at Interfaces Using Guided Modes and Advanced Phase-Contrast Imaging Techniques -- Electrochemical Biosensors for Food Security: Mycotoxins Detection -- Comparative Studies on Optical Biosensors for Detection of Bio-toxins.< . |
Record Nr. | UNINA-9910254639203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain and Clinical Trial : Securing Patient Data / / edited by Hamid Jahankhani, Stefan Kendzierskyj, Arshad Jamal, Gregory Epiphaniou, Haider Al-Khateeb |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (270 pages) |
Disciplina | 005.74 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
Health informatics System safety Systems and Data Security Privacy Health Informatics Security Science and Technology |
ISBN | 3-030-11289-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Blockchain and Healthcare -- Digital Transformation of Healthcare -- Healthcare Patient and Clinical Research -- Information security governance, technology, processes and people: Compliance and organisational readiness; B. Papp-Silva et al -- Cyber-Physical Attacks and the Value of Healthcare Data: Facing an Era of Cyber Extortion and Organised Crime -- The Transparency of Big Data, Data Harvesting and Digital Twins -- Blockchain for Modern Digital Forensics: The Chain-of-Custody as a Distributed Ledger -- The Standardised Digital Forensic Investigation Process Model (SDFIPM) -- Hybrid Cyber security framework for the internet of medical things -- BMAR - Blockchain for Medication Administration Records -- Recent Cyber Attacks and Vulnerabilities in Medical Devices and Healthcare Institutions. |
Record Nr. | UNINA-9910337850303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cold War Space Sleuths [[electronic resource] ] : The Untold Secrets of the Soviet Space Program / / edited by Dominic Phelan |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | New York, NY : , : Springer New York : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (314 p.) |
Disciplina | 623.74 |
Collana | Space Exploration |
Soggetto topico |
Aerospace engineering
Astronautics Astronomy System safety Aerospace Technology and Astronautics Popular Science in Astronomy Security Science and Technology |
ISBN |
1-283-90793-3
1-4614-3052-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Editor's introduction -- Acknowledgements -- Chapter 1: Space sleuths and their 'scoops' Dominic Phelan -- Chapter 2: Hidden in plain view Brian Harvey -- Chapter 3: The satellite trackers Sven Grahn -- Chapter 4: Cosmonauts who weren't there James Oberg -- Chapter 5: The view from Paris Claude Wachtel and Christian Lardier -- Chapter 6: Orbital elements of surprise Phillip Clark -- Chapter 7: Adventures in Star City Bert Vis -- Chapter 8: Russian-language sleuthing Bart Hendrickx -- Chapter 9: People and archives Asif Siddiqi -- Chapter 10: Urban cosmonauts and space historians David J. Shayler -- Contributors -- Index. |
Record Nr. | UNINA-9910438114203321 |
New York, NY : , : Springer New York : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Combating Security Challenges in the Age of Big Data [[electronic resource] ] : Powered by State-of-the-Art Artificial Intelligence Techniques / / edited by Zubair Md. Fadlullah, Al-Sakib Khan Pathan |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (271 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Data protection
Big data Artificial intelligence System safety Electrical engineering Security Big Data Artificial Intelligence Security Science and Technology Communications Engineering, Networks |
ISBN | 3-030-35642-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure Big data Transmission with Trust management for the Internet of Things (IoT) -- Concept Drift for Big Data -- Classification of Outlier’s Detection Methods Based on Quantitative Or Semantic Learning -- Cognitive Artificial Intelligence Countermeasure For Enhancing The Security Of Big Data Hardware From Power Analysis Attack -- On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc Networks -- Deep Learning Approaches For IoT Security In The Big Data Era -- Deep Learning meets Malware Detection: An Investigation -- The Utilization of Blockchain for Enhancing Big Data Security and Veracity -- Authentication Methodology for Securing Machine-to-Machine Communication in Smart Grid -- Combating Intrusions in Smart Grid: Practical Defense and Forecasting Approaches -- Blockchain-based Distributed Key Management Approach Tailored for Smart Grid. |
Record Nr. | UNISA-996465360103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Combating Security Challenges in the Age of Big Data : Powered by State-of-the-Art Artificial Intelligence Techniques / / edited by Zubair Md. Fadlullah, Al-Sakib Khan Pathan |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (271 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Data protection
Big data Artificial intelligence System safety Electrical engineering Security Big Data Artificial Intelligence Security Science and Technology Communications Engineering, Networks |
ISBN | 3-030-35642-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure Big data Transmission with Trust management for the Internet of Things (IoT) -- Concept Drift for Big Data -- Classification of Outlier’s Detection Methods Based on Quantitative Or Semantic Learning -- Cognitive Artificial Intelligence Countermeasure For Enhancing The Security Of Big Data Hardware From Power Analysis Attack -- On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc Networks -- Deep Learning Approaches For IoT Security In The Big Data Era -- Deep Learning meets Malware Detection: An Investigation -- The Utilization of Blockchain for Enhancing Big Data Security and Veracity -- Authentication Methodology for Securing Machine-to-Machine Communication in Smart Grid -- Combating Intrusions in Smart Grid: Practical Defense and Forecasting Approaches -- Blockchain-based Distributed Key Management Approach Tailored for Smart Grid. |
Record Nr. | UNINA-9910409664103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Combatting Cybercrime and Cyberterrorism : Challenges, Trends and Priorities / / edited by Babak Akhgar, Ben Brewster |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XII, 323 p. 36 illus.) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer crimes
Computer security System safety Cybercrime Systems and Data Security Security Science and Technology |
ISBN | 3-319-38930-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1- Approaching Cybercrime and Cyberterrorism Research -- Part 2- Legal, Ethical and Privacy Considerations -- Part 3- Technologies, Scenarios and Best Practices -- Part 4- Policy Development and Roadmaps for CC/CT Research. |
Record Nr. | UNINA-9910253308803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Compressive Sensing Based Algorithms for Electronic Defence / / by Amit Kumar Mishra, Ryno Strauss Verster |
Autore | Mishra Amit Kumar |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 184 p. 106 illus., 59 illus. in color.) |
Disciplina | 621.3822 |
Collana | Signals and Communication Technology |
Soggetto topico |
Signal processing
Image processing Speech processing systems Special purpose computers System safety Electrical engineering Signal, Image and Speech Processing Special Purpose and Application-Based Systems Security Science and Technology Communications Engineering, Networks |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Electronic Warfare Communication Systems -- Compressive Sensing applied to Electronic Support tasks. |
Record Nr. | UNINA-9910156337803321 |
Mishra Amit Kumar | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computational Personality Analysis : Introduction, Practical Applications and Novel Directions / / by Yair Neuman |
Autore | Neuman Yair <1968-> |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (120 p.) |
Disciplina | 004 |
Soggetto topico |
Application software
Personality Social psychology Computational linguistics Criminology System safety Computer Appl. in Social and Behavioral Sciences Personality and Social Psychology Computational Linguistics Criminology and Criminal Justice, general Security Science and Technology |
ISBN | 3-319-42460-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Acknowledgments -- Introduction: From The Princess Bride to computational personality -- Personality in a nutshell: Understanding who we are -- Computational personality analysis: When the machine meets the psychologist -- Distributional semantics and personality: How to find a perpetrator in a haystack -- Themes of personality: Profiling a political leader -- Going beyond words: How the Sisters of Mercy may identify psychopaths -- Hidden textual themes: Into Shakespeare’s mind -- The complexity of personality: From Snowden to Superman -- Attractors of personality: A murderer, a terrorist and some angry Jews -- Taking complexity a step forward: The reversibility of the pedophile’s mind -- Discussion -- Appendix -- Author index -- Subject index. |
Record Nr. | UNINA-9910255008203321 |
Neuman Yair <1968-> | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer security and the Internet [[electronic resource] ] : tools and Jewels / / by Paul C. van Oorschot |
Autore | Van Oorschot Paul C |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (381 pages) |
Disciplina | 005.8 |
Collana | Information Security and Cryptography |
Soggetto topico |
Seguretat informàtica
Ordinadors - Disseny i funcionament Computer security System safety Computer organization Electrical engineering Application software Systems and Data Security Security Science and Technology Computer Systems Organization and Communication Networks Communications Engineering, Networks Information Systems Applications (incl. Internet) |
ISBN |
3-030-33649-2
9783030336493 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Basic Concepts and Principles -- Cryptographic Building Blocks -- User Authentication: Passwords, Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security and Access Control -- Software Security: Exploits and Privilege Escalation -- Malicious Software -- Public-Key Certificate Management and Use Cases -- Web and Browser Security -- Firewalls and Tunnels -- Intrusion Detection and Network-Based Attacks -- Epilogue -- Index. |
Record Nr. | UNISA-996465472503316 |
Van Oorschot Paul C | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer security and the Internet : tools and Jewels / / by Paul C. van Oorschot |
Autore | Van Oorschot Paul C |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (381 pages) |
Disciplina | 005.8 |
Collana | Information Security and Cryptography |
Soggetto topico |
Seguretat informàtica
Ordinadors - Disseny i funcionament Computer security System safety Computer organization Electrical engineering Application software Systems and Data Security Security Science and Technology Computer Systems Organization and Communication Networks Communications Engineering, Networks Information Systems Applications (incl. Internet) |
ISBN |
3-030-33649-2
9783030336493 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Basic Concepts and Principles -- Cryptographic Building Blocks -- User Authentication: Passwords, Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security and Access Control -- Software Security: Exploits and Privilege Escalation -- Malicious Software -- Public-Key Certificate Management and Use Cases -- Web and Browser Security -- Firewalls and Tunnels -- Intrusion Detection and Network-Based Attacks -- Epilogue -- Index. |
Record Nr. | UNINA-9910409671203321 |
Van Oorschot Paul C | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|