top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptology Transmitted Message Protection [[electronic resource] ] : From Deterministic Chaos up to Optical Vortices / / by Igor Izmailov, Boris Poizner, Ilia Romanov, Sergey Smolskiy
Cryptology Transmitted Message Protection [[electronic resource] ] : From Deterministic Chaos up to Optical Vortices / / by Igor Izmailov, Boris Poizner, Ilia Romanov, Sergey Smolskiy
Autore Izmailov Igor
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XXVIII, 364 p. 225 illus., 19 illus. in color.)
Disciplina 005.82
Collana Signals and Communication Technology
Soggetto topico Data structures (Computer science)
Electrical engineering
Quantum computers
Spintronics
System safety
Applied mathematics
Engineering mathematics
Data Structures and Information Theory
Communications Engineering, Networks
Quantum Information Technology, Spintronics
Security Science and Technology
Applications of Mathematics
ISBN 3-319-30125-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Radio Electronic and Optical Chaos Oscillators Applicable for Information Protection -- Simulation of the Radio Electronic Communication System on the Basis of the Chaotic Oscillator with Nonlinearity in the Form of Parabolas Composition -- Simulation of Data Ciphering and Deciphering with the Help of Nonlinear Interferometers in the Optical System of Synchronous Chaotic Communication -- Optical Vortices in Non-Ring Interferometer and a Model of the Digital Communication System -- Conclusion.
Record Nr. UNINA-9910254237303321
Izmailov Igor  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Criminology [[electronic resource] /] / edited by Hamid Jahankhani
Cyber Criminology [[electronic resource] /] / edited by Hamid Jahankhani
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (357 pages)
Disciplina 364.168
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer crimes
Criminal law
System safety
Data protection
Cybercrime
Criminal Law and Criminal Procedure Law
Security Science and Technology
Security
ISBN 9783319971810
3319971816
9783319971803
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- Cyber Criminology and Psychology -- Crime and Social Media: Legal responses to offensive online communications and abuse -- Explaining Why Cybercrime Occurs: Criminological and Psychological Theories -- Cyberaggression and Cyberbullying: Widening the Net -- Part 2 Cyber-Threat Landscape -- Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments -- The Dark Web -- Tor black markets: economics characterization and investigation technique; G. Me, L. Pesticcio -- A New Scalable Botnet Detection Method in the Frequency Domain -- Part 3 Cybercrime Detection -- Predicting the Cyber Attackers; a Comparison of Different Classification Techniques -- Criminal Data Mining, Threat Analysis and Prediction -- SMERF: Social Media, Ethics & Risk Framework; I. Mitchell et al -- Understanding the cyber-victimisation of people with long term conditions and the need for collaborative forensics-enabled Disease Management Programmes -- An Investigator’s Christmas Carol - Past, Present, and Future Law Enforcement Agency Data Mining Practices -- DaPA: Deconstruct and Preserve for all: A Procedure for the Preservation of Digital Evidence on Solid State Drives and Traditional Storage Media -- Part 4 Education, Training and Awareness in Cybercrime Prevention -- An examination into the effect of early education on cyber security awareness within the U.K -- An examination into the level of training, education and awareness among frontline police officers in tackling cybercrime within the Metropolitan Police Service -- Combating Cyber Victimisation: Cybercrime Prevention -- Information security landscape in Vietnam: insights from two research surveys.
Record Nr. UNINA-9910300049503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity [[electronic resource] /] / edited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity [[electronic resource] /] / edited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (viii, 450 pages) : illustrations
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Artificial intelligence
Big data
Computer security
System safety
Artificial Intelligence
Big Data
Privacy
Security Science and Technology
ISBN 3-030-35746-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- Part 1: Cyber Defence & Critical National Infrastructure (CNI) -- Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age -- The Malicious Use of AI-based Deepfake technology as the New Threat to Psychological Security and Political Stability -- Considerations for the Governance of AI and Government Legislative Frameworks -- Part 2: Augmented Humanity & Digital Society -- Augmented humanity: Data, Privacy and Security -- Consumer Awareness on Security and Privacy Threat of Medical Devices -- Biohacking Capabilities & Threat/ Attack Vectors -- Digital Twins for Precision Healthcare -- 5G Cybersecurity Vulnerabilities with IoT and Smart Societies -- Part 3: Technology of Cyber Attacks -- Blockchain, TTP Attacks and Harmonious Relationship with AI -- Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks -- Experimental Analyses in Search of Effective Mitigation for Login Cross-Site Request Forgery -- Attack Vectors and Advanced Persistent Threats -- Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks -- Part 4: Smart Societies and Data Exploitation -- Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management -- Combating Domestic Abuse inflicted in smart societies -- Deep Convolutional Neural Networks for Forensic Age Estimation: a Review -- Secure Implementation of E-governance: a Case Study about Estonia -- Insider Threat.
Record Nr. UNINA-9910409675203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity [[electronic resource] /] / edited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity [[electronic resource] /] / edited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (viii, 450 pages) : illustrations
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Artificial intelligence
Big data
Computer security
System safety
Artificial Intelligence
Big Data
Privacy
Security Science and Technology
ISBN 3-030-35746-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- Part 1: Cyber Defence & Critical National Infrastructure (CNI) -- Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age -- The Malicious Use of AI-based Deepfake technology as the New Threat to Psychological Security and Political Stability -- Considerations for the Governance of AI and Government Legislative Frameworks -- Part 2: Augmented Humanity & Digital Society -- Augmented humanity: Data, Privacy and Security -- Consumer Awareness on Security and Privacy Threat of Medical Devices -- Biohacking Capabilities & Threat/ Attack Vectors -- Digital Twins for Precision Healthcare -- 5G Cybersecurity Vulnerabilities with IoT and Smart Societies -- Part 3: Technology of Cyber Attacks -- Blockchain, TTP Attacks and Harmonious Relationship with AI -- Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks -- Experimental Analyses in Search of Effective Mitigation for Login Cross-Site Request Forgery -- Attack Vectors and Advanced Persistent Threats -- Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks -- Part 4: Smart Societies and Data Exploitation -- Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management -- Combating Domestic Abuse inflicted in smart societies -- Deep Convolutional Neural Networks for Forensic Age Estimation: a Review -- Secure Implementation of E-governance: a Case Study about Estonia -- Insider Threat.
Record Nr. UNISA-996465447703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security: Analytics, Technology and Automation [[electronic resource] /] / edited by Martti Lehto, Pekka Neittaanmäki
Cyber Security: Analytics, Technology and Automation [[electronic resource] /] / edited by Martti Lehto, Pekka Neittaanmäki
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (268 p.)
Disciplina 004
005.8
621.382
621.389
Collana Intelligent Systems, Control and Automation: Science and Engineering
Soggetto topico Computer security
Electrical engineering
System safety
Systems and Data Security
Communications Engineering, Networks
Security Science and Technology
ISBN 3-319-18302-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I Cyber World Today -- 1 Phenomenon in the Cyber World -- 2 Cyber World as a Social System -- 3 Citizens in Cyber World – Despatches from the Virtual "Clinic" -- 4 Powers and Fundamental Rights in Cyber Security -- Part II: Cyber Security Threats, Legality and Strategy -- 1 Coder, Hacker, Soldier, Spy -- 2 Cyber Warfare -- 3 Deception in the Cyber-World -- 4 Legal Framework of Cyber Security -- 5 Finnish Cyber Security Strategy and Implementation -- Part III Cyber Security Technology -- 1 Clustering-Based Protocol Classification via Dimensionality Reduction -- 2 Timing and Side Channel Attacks -- 3 Knowledge Discovery from Network Logs -- 4 Trusted Computing and DRM -- Part IV Cyber Security and Automation -- 1 Cyber Security and Protection of ICS Systems: An Australian Example -- 2 Towards Dependable Automation -- 3 Specialized Honeypots for SCADA Systems.
Record Nr. UNINA-9910299816603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-Physical Systems Security [[electronic resource] /] / edited by Çetin Kaya Koç
Cyber-Physical Systems Security [[electronic resource] /] / edited by Çetin Kaya Koç
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (347 pages)
Disciplina 006.22
Soggetto topico Data structures (Computer science)
Data protection
Public safety
System safety
Data Structures and Information Theory
Security
Crime Control and Security
Security Science and Technology
ISBN 3-319-98935-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Robust Digital Computation in the Physical World -- Constraint-Based Framework for Reasoning with Differential Equations -- Approximate Computing and Its Application to Hardware Security -- Mathematical Optimizations for Deep Learning -- A Zero-Entry Cyber Range Environment for Future Learning Ecosystems -- Parallel Programming in Cyber-Physical Systems -- Automatic Application of Software Countermeasures Against Physical Attacks -- Time-Delay Attacks in Network Systems -- Attack Tree Construction and Its Application to the Connected Vehicle -- Reinforcement Learning and Trustworthy Autonomy -- Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks -- Public-Key-Based Lightweight Swarm Authentication -- Physical Security Versus Masking Schemes -- Embedded Classifiers for Energy Constrained IoT Network Security -- Challenges in Cyber Security: Ransomware Phenomenon -- Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems.
Record Nr. UNINA-9910303454803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-Security in Critical Infrastructures [[electronic resource] ] : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu
Cyber-Security in Critical Infrastructures [[electronic resource] ] : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu
Autore Rass Stefan
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (299 pages)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer security
Game theory
System safety
Computer crimes
Systems and Data Security
Game Theory, Economics, Social and Behav. Sciences
Security Science and Technology
Game Theory
Cybercrime
ISBN 3-030-46908-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Introduction -- 1. Introduction -- 2. Critical Infrastructures -- 3. Mathematical Decision Making -- 4. Types of Games -- 5. Bounded Rationality -- Part II Security Games -- 6. Risk Management -- 7. Insurance -- 8. Patrolling and Surveillance Games. 9. Optimal Inspection Plans -- 10. Defense-in-Depth-Games -- 11. Cryptographic Games -- 12. Practicalities -- Acronyms -- Glossary -- List of Symbols -- Index.
Record Nr. UNINA-9910410054403321
Rass Stefan  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-Security in Critical Infrastructures [[electronic resource] ] : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu
Cyber-Security in Critical Infrastructures [[electronic resource] ] : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu
Autore Rass Stefan
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (299 pages)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer security
Game theory
System safety
Computer crimes
Systems and Data Security
Game Theory, Economics, Social and Behav. Sciences
Security Science and Technology
Game Theory
Cybercrime
ISBN 3-030-46908-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Introduction -- 1. Introduction -- 2. Critical Infrastructures -- 3. Mathematical Decision Making -- 4. Types of Games -- 5. Bounded Rationality -- Part II Security Games -- 6. Risk Management -- 7. Insurance -- 8. Patrolling and Surveillance Games. 9. Optimal Inspection Plans -- 10. Defense-in-Depth-Games -- 11. Cryptographic Games -- 12. Practicalities -- Acronyms -- Glossary -- List of Symbols -- Index.
Record Nr. UNISA-996465371103316
Rass Stefan  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cybersecurity and Secure Information Systems [[electronic resource] ] : Challenges and Solutions in Smart Environments / / edited by Aboul Ella Hassanien, Mohamed Elhoseny
Cybersecurity and Secure Information Systems [[electronic resource] ] : Challenges and Solutions in Smart Environments / / edited by Aboul Ella Hassanien, Mohamed Elhoseny
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 314 p. 128 illus., 95 illus. in color.)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer security
System safety
Data encryption (Computer science)
Systems and Data Security
Privacy
Security Science and Technology
Cryptology
ISBN 3-030-16837-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Privacy in Smart City Applications and Services: Opportunities and Challenges -- A Lightweight Multi-Level Encryption Model for IoT Applications -- An Efficient Image Encryption Scheme based on Signcryption Technique with Adaptive Elephant Herding Optimization -- Time Split based Pre-processing with a Data-driven Approach for Malicious URL Detection; Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model -- Deep learning Framework for Cyber Threat Situational Awareness based on Email and URL Data Analysis -- Application of Deep Learning Architectures for Cyber security.-Improved DGA Domain Names Detection and Categorization using Deep learning Architectures with Classical Machine learning Algorithms -- Secure Data Transmission through Reliable Vehicles in VANET using Optimal Lightweight Cryptography -- Some specific examples of attacks on information systems and smart cities applications -- Clustering Based Cybersecurity Model for Cloud Data -- A Detailed Investigation and Analysis of Deep Learning Architectures and Visualization Techniques for Malware Family Identification -- Design and Implementation of a Research and Education Cybersecurity Operations Center.
Record Nr. UNINA-9910337835503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberspace [[electronic resource] ] : Risks and Benefits for Society, Security and Development / / edited by J. Martín Ramírez, Luis A. García-Segura
Cyberspace [[electronic resource] ] : Risks and Benefits for Society, Security and Development / / edited by J. Martín Ramírez, Luis A. García-Segura
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XII, 281 p. 17 illus., 13 illus. in color.)
Disciplina 364
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer crimes
Computer security
System safety
Cybercrime
Systems and Data Security
Security Science and Technology
ISBN 3-319-54975-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Cyberspace -- On how the Cyberspace arose to fulfill theoretical physicists' needs and eventually changed the world: Personal recallings and a practitioner's perspective -- Narrative mapping of cyberspace. Context and consequences -- A Conceptual and Legal Approach to The Cyberspace: The dilemma security vs. Freedom -- The digital revolution in underdeveloped countries: brief analysis of the Dominican Republic -- Business strategy in the digital era. Digital transformation, disruption and cybersecurity -- Impact of cyberspace on individual and group security – a human developmental psychology approach -- Part II: Cybersecurity -- Cyberspace: A platform for organized crime -- Some Criminal Aspects of Cybersecurity -- The situation and evolution of the managed services of Cybersecurity, towards 3.0 and beyond… -- Collaboration of private investigation with public institutions within the Spanish cybersecurity strategy. How private investigation gathers proof on cyber delinquency -- Psychosociological characteristics of cybercrime -- Use of cyberspace for terrorist purposes -- Mythology of Cyber-crime – Insecurity & Governance in Cyberspace: some critical perspectives -- Part III: Cyberwarfare. The Tallinn Manual and Jus ad Bellum: Some critical notes -- War-like activities in the cyberspace: Applicability of the Law of Armed Conflicts -- A Negotiation on Cyber warfare -- Security of Cyber-space in Nuclear Facilities -- Can cyber warfare prevent wars? -- Epilogue -- L. A. García-Segura. <.
Record Nr. UNINA-9910255279103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui