Cryptology Transmitted Message Protection [[electronic resource] ] : From Deterministic Chaos up to Optical Vortices / / by Igor Izmailov, Boris Poizner, Ilia Romanov, Sergey Smolskiy |
Autore | Izmailov Igor |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XXVIII, 364 p. 225 illus., 19 illus. in color.) |
Disciplina | 005.82 |
Collana | Signals and Communication Technology |
Soggetto topico |
Data structures (Computer science)
Electrical engineering Quantum computers Spintronics System safety Applied mathematics Engineering mathematics Data Structures and Information Theory Communications Engineering, Networks Quantum Information Technology, Spintronics Security Science and Technology Applications of Mathematics |
ISBN | 3-319-30125-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Radio Electronic and Optical Chaos Oscillators Applicable for Information Protection -- Simulation of the Radio Electronic Communication System on the Basis of the Chaotic Oscillator with Nonlinearity in the Form of Parabolas Composition -- Simulation of Data Ciphering and Deciphering with the Help of Nonlinear Interferometers in the Optical System of Synchronous Chaotic Communication -- Optical Vortices in Non-Ring Interferometer and a Model of the Digital Communication System -- Conclusion. |
Record Nr. | UNINA-9910254237303321 |
Izmailov Igor
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Criminology [[electronic resource] /] / edited by Hamid Jahankhani |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (357 pages) |
Disciplina | 364.168 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer crimes
Criminal law System safety Data protection Cybercrime Criminal Law and Criminal Procedure Law Security Science and Technology Security |
ISBN |
9783319971810
3319971816 9783319971803 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Cyber Criminology and Psychology -- Crime and Social Media: Legal responses to offensive online communications and abuse -- Explaining Why Cybercrime Occurs: Criminological and Psychological Theories -- Cyberaggression and Cyberbullying: Widening the Net -- Part 2 Cyber-Threat Landscape -- Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments -- The Dark Web -- Tor black markets: economics characterization and investigation technique; G. Me, L. Pesticcio -- A New Scalable Botnet Detection Method in the Frequency Domain -- Part 3 Cybercrime Detection -- Predicting the Cyber Attackers; a Comparison of Different Classification Techniques -- Criminal Data Mining, Threat Analysis and Prediction -- SMERF: Social Media, Ethics & Risk Framework; I. Mitchell et al -- Understanding the cyber-victimisation of people with long term conditions and the need for collaborative forensics-enabled Disease Management Programmes -- An Investigator’s Christmas Carol - Past, Present, and Future Law Enforcement Agency Data Mining Practices -- DaPA: Deconstruct and Preserve for all: A Procedure for the Preservation of Digital Evidence on Solid State Drives and Traditional Storage Media -- Part 4 Education, Training and Awareness in Cybercrime Prevention -- An examination into the effect of early education on cyber security awareness within the U.K -- An examination into the level of training, education and awareness among frontline police officers in tackling cybercrime within the Metropolitan Police Service -- Combating Cyber Victimisation: Cybercrime Prevention -- Information security landscape in Vietnam: insights from two research surveys. |
Record Nr. | UNINA-9910300049503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity [[electronic resource] /] / edited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (viii, 450 pages) : illustrations |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Artificial intelligence
Big data Computer security System safety Artificial Intelligence Big Data Privacy Security Science and Technology |
ISBN | 3-030-35746-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Part 1: Cyber Defence & Critical National Infrastructure (CNI) -- Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age -- The Malicious Use of AI-based Deepfake technology as the New Threat to Psychological Security and Political Stability -- Considerations for the Governance of AI and Government Legislative Frameworks -- Part 2: Augmented Humanity & Digital Society -- Augmented humanity: Data, Privacy and Security -- Consumer Awareness on Security and Privacy Threat of Medical Devices -- Biohacking Capabilities & Threat/ Attack Vectors -- Digital Twins for Precision Healthcare -- 5G Cybersecurity Vulnerabilities with IoT and Smart Societies -- Part 3: Technology of Cyber Attacks -- Blockchain, TTP Attacks and Harmonious Relationship with AI -- Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks -- Experimental Analyses in Search of Effective Mitigation for Login Cross-Site Request Forgery -- Attack Vectors and Advanced Persistent Threats -- Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks -- Part 4: Smart Societies and Data Exploitation -- Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management -- Combating Domestic Abuse inflicted in smart societies -- Deep Convolutional Neural Networks for Forensic Age Estimation: a Review -- Secure Implementation of E-governance: a Case Study about Estonia -- Insider Threat. |
Record Nr. | UNINA-9910409675203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity [[electronic resource] /] / edited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (viii, 450 pages) : illustrations |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Artificial intelligence
Big data Computer security System safety Artificial Intelligence Big Data Privacy Security Science and Technology |
ISBN | 3-030-35746-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Part 1: Cyber Defence & Critical National Infrastructure (CNI) -- Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age -- The Malicious Use of AI-based Deepfake technology as the New Threat to Psychological Security and Political Stability -- Considerations for the Governance of AI and Government Legislative Frameworks -- Part 2: Augmented Humanity & Digital Society -- Augmented humanity: Data, Privacy and Security -- Consumer Awareness on Security and Privacy Threat of Medical Devices -- Biohacking Capabilities & Threat/ Attack Vectors -- Digital Twins for Precision Healthcare -- 5G Cybersecurity Vulnerabilities with IoT and Smart Societies -- Part 3: Technology of Cyber Attacks -- Blockchain, TTP Attacks and Harmonious Relationship with AI -- Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks -- Experimental Analyses in Search of Effective Mitigation for Login Cross-Site Request Forgery -- Attack Vectors and Advanced Persistent Threats -- Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks -- Part 4: Smart Societies and Data Exploitation -- Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management -- Combating Domestic Abuse inflicted in smart societies -- Deep Convolutional Neural Networks for Forensic Age Estimation: a Review -- Secure Implementation of E-governance: a Case Study about Estonia -- Insider Threat. |
Record Nr. | UNISA-996465447703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security: Analytics, Technology and Automation [[electronic resource] /] / edited by Martti Lehto, Pekka Neittaanmäki |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (268 p.) |
Disciplina |
004
005.8 621.382 621.389 |
Collana | Intelligent Systems, Control and Automation: Science and Engineering |
Soggetto topico |
Computer security
Electrical engineering System safety Systems and Data Security Communications Engineering, Networks Security Science and Technology |
ISBN | 3-319-18302-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I Cyber World Today -- 1 Phenomenon in the Cyber World -- 2 Cyber World as a Social System -- 3 Citizens in Cyber World – Despatches from the Virtual "Clinic" -- 4 Powers and Fundamental Rights in Cyber Security -- Part II: Cyber Security Threats, Legality and Strategy -- 1 Coder, Hacker, Soldier, Spy -- 2 Cyber Warfare -- 3 Deception in the Cyber-World -- 4 Legal Framework of Cyber Security -- 5 Finnish Cyber Security Strategy and Implementation -- Part III Cyber Security Technology -- 1 Clustering-Based Protocol Classification via Dimensionality Reduction -- 2 Timing and Side Channel Attacks -- 3 Knowledge Discovery from Network Logs -- 4 Trusted Computing and DRM -- Part IV Cyber Security and Automation -- 1 Cyber Security and Protection of ICS Systems: An Australian Example -- 2 Towards Dependable Automation -- 3 Specialized Honeypots for SCADA Systems. |
Record Nr. | UNINA-9910299816603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber-Physical Systems Security [[electronic resource] /] / edited by Çetin Kaya Koç |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (347 pages) |
Disciplina | 006.22 |
Soggetto topico |
Data structures (Computer science)
Data protection Public safety System safety Data Structures and Information Theory Security Crime Control and Security Security Science and Technology |
ISBN | 3-319-98935-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Robust Digital Computation in the Physical World -- Constraint-Based Framework for Reasoning with Differential Equations -- Approximate Computing and Its Application to Hardware Security -- Mathematical Optimizations for Deep Learning -- A Zero-Entry Cyber Range Environment for Future Learning Ecosystems -- Parallel Programming in Cyber-Physical Systems -- Automatic Application of Software Countermeasures Against Physical Attacks -- Time-Delay Attacks in Network Systems -- Attack Tree Construction and Its Application to the Connected Vehicle -- Reinforcement Learning and Trustworthy Autonomy -- Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks -- Public-Key-Based Lightweight Swarm Authentication -- Physical Security Versus Masking Schemes -- Embedded Classifiers for Energy Constrained IoT Network Security -- Challenges in Cyber Security: Ransomware Phenomenon -- Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems. |
Record Nr. | UNINA-9910303454803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber-Security in Critical Infrastructures [[electronic resource] ] : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu |
Autore | Rass Stefan |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (299 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
Game theory System safety Computer crimes Systems and Data Security Game Theory, Economics, Social and Behav. Sciences Security Science and Technology Game Theory Cybercrime |
ISBN | 3-030-46908-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1. Introduction -- 1. Introduction -- 2. Critical Infrastructures -- 3. Mathematical Decision Making -- 4. Types of Games -- 5. Bounded Rationality -- Part II Security Games -- 6. Risk Management -- 7. Insurance -- 8. Patrolling and Surveillance Games. 9. Optimal Inspection Plans -- 10. Defense-in-Depth-Games -- 11. Cryptographic Games -- 12. Practicalities -- Acronyms -- Glossary -- List of Symbols -- Index. |
Record Nr. | UNINA-9910410054403321 |
Rass Stefan
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber-Security in Critical Infrastructures [[electronic resource] ] : A Game-Theoretic Approach / / by Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu |
Autore | Rass Stefan |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (299 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
Game theory System safety Computer crimes Systems and Data Security Game Theory, Economics, Social and Behav. Sciences Security Science and Technology Game Theory Cybercrime |
ISBN | 3-030-46908-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1. Introduction -- 1. Introduction -- 2. Critical Infrastructures -- 3. Mathematical Decision Making -- 4. Types of Games -- 5. Bounded Rationality -- Part II Security Games -- 6. Risk Management -- 7. Insurance -- 8. Patrolling and Surveillance Games. 9. Optimal Inspection Plans -- 10. Defense-in-Depth-Games -- 11. Cryptographic Games -- 12. Practicalities -- Acronyms -- Glossary -- List of Symbols -- Index. |
Record Nr. | UNISA-996465371103316 |
Rass Stefan
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cybersecurity and Secure Information Systems [[electronic resource] ] : Challenges and Solutions in Smart Environments / / edited by Aboul Ella Hassanien, Mohamed Elhoseny |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 314 p. 128 illus., 95 illus. in color.) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
System safety Data encryption (Computer science) Systems and Data Security Privacy Security Science and Technology Cryptology |
ISBN | 3-030-16837-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and Privacy in Smart City Applications and Services: Opportunities and Challenges -- A Lightweight Multi-Level Encryption Model for IoT Applications -- An Efficient Image Encryption Scheme based on Signcryption Technique with Adaptive Elephant Herding Optimization -- Time Split based Pre-processing with a Data-driven Approach for Malicious URL Detection; Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model -- Deep learning Framework for Cyber Threat Situational Awareness based on Email and URL Data Analysis -- Application of Deep Learning Architectures for Cyber security.-Improved DGA Domain Names Detection and Categorization using Deep learning Architectures with Classical Machine learning Algorithms -- Secure Data Transmission through Reliable Vehicles in VANET using Optimal Lightweight Cryptography -- Some specific examples of attacks on information systems and smart cities applications -- Clustering Based Cybersecurity Model for Cloud Data -- A Detailed Investigation and Analysis of Deep Learning Architectures and Visualization Techniques for Malware Family Identification -- Design and Implementation of a Research and Education Cybersecurity Operations Center. |
Record Nr. | UNINA-9910337835503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberspace [[electronic resource] ] : Risks and Benefits for Society, Security and Development / / edited by J. Martín Ramírez, Luis A. García-Segura |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XII, 281 p. 17 illus., 13 illus. in color.) |
Disciplina | 364 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer crimes
Computer security System safety Cybercrime Systems and Data Security Security Science and Technology |
ISBN | 3-319-54975-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I: Cyberspace -- On how the Cyberspace arose to fulfill theoretical physicists' needs and eventually changed the world: Personal recallings and a practitioner's perspective -- Narrative mapping of cyberspace. Context and consequences -- A Conceptual and Legal Approach to The Cyberspace: The dilemma security vs. Freedom -- The digital revolution in underdeveloped countries: brief analysis of the Dominican Republic -- Business strategy in the digital era. Digital transformation, disruption and cybersecurity -- Impact of cyberspace on individual and group security – a human developmental psychology approach -- Part II: Cybersecurity -- Cyberspace: A platform for organized crime -- Some Criminal Aspects of Cybersecurity -- The situation and evolution of the managed services of Cybersecurity, towards 3.0 and beyond… -- Collaboration of private investigation with public institutions within the Spanish cybersecurity strategy. How private investigation gathers proof on cyber delinquency -- Psychosociological characteristics of cybercrime -- Use of cyberspace for terrorist purposes -- Mythology of Cyber-crime – Insecurity & Governance in Cyberspace: some critical perspectives -- Part III: Cyberwarfare. The Tallinn Manual and Jus ad Bellum: Some critical notes -- War-like activities in the cyberspace: Applicability of the Law of Armed Conflicts -- A Negotiation on Cyber warfare -- Security of Cyber-space in Nuclear Facilities -- Can cyber warfare prevent wars? -- Epilogue -- L. A. García-Segura. <. |
Record Nr. | UNINA-9910255279103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|