top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Application of Social Media in Crisis Management : Advanced Sciences and Technologies for Security Applications / / edited by Babak Akhgar, Andrew Staniforth, David Waddington
Application of Social Media in Crisis Management : Advanced Sciences and Technologies for Security Applications / / edited by Babak Akhgar, Andrew Staniforth, David Waddington
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 236 p. 63 illus., 61 illus. in color.)
Disciplina 621.382
Collana Transactions on Computational Science and Computational Intelligence
Soggetto topico Electrical engineering
Quality control
Reliability
Industrial safety
Computers
Computer networks
Organization
Planning
Social media
Communications Engineering, Networks
Quality Control, Reliability, Safety and Risk
Information Systems and Communication Service
Computer Communication Networks
Social Media
ISBN 3-319-52419-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Section I: Human Factors and Recommendations for Best Practice -- Human Factors in Crisis, Disaster and Emergency: Some Policy Im-plications and Lessons of Effective Communication -- Crisis Management, Social Media and Smart Devices -- Case Studies in Crisis Communication: Some Pointers to Best Practice -- Section II: Technological Design and Development of ATHENA -- Best Practices in the Design of a Citizen-Focused Crisis Management Platform -- Analyzing Crowd-Sourced Information and Social Media for Crisis Management -- The Athena Mobile Application -- Standardization to Deal with Multi-lingual Information in Social Me-dia During Large-scale Crisis Situations -- Cloud-based Intelligence Acquisition and Processing for Crisis Man-agement -- Section III: Salient Legal Considerations -- The Relevant Legal Framework -- Legal Considerations Relating to the Police Use of Social Media -- Section IV: Testing and Evaluating the ATHENA System -- Preliminary ATHENA Case Studies: Test-bed Development and De-livery -- The Final Athena Test Case: West Yorkshire Police Training and Development Centre, Wakefield (UK), September 2016 -- Concluding remarks -- Index.
Record Nr. UNINA-9910254342603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Combatting Cybercrime and Cyberterrorism : Challenges, Trends and Priorities / / edited by Babak Akhgar, Ben Brewster
Combatting Cybercrime and Cyberterrorism : Challenges, Trends and Priorities / / edited by Babak Akhgar, Ben Brewster
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 323 p. 36 illus.)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer crimes
Computer security
System safety
Cybercrime
Systems and Data Security
Security Science and Technology
ISBN 3-319-38930-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1- Approaching Cybercrime and Cyberterrorism Research -- Part 2- Legal, Ethical and Privacy Considerations -- Part 3- Technologies, Scenarios and Best Practices -- Part 4- Policy Development and Roadmaps for CC/CT Research.
Record Nr. UNINA-9910253308803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Community Policing - A European Perspective : Strategies, Best Practices and Guidelines / / edited by P. Saskia Bayerl, Ruža Karlović, Babak Akhgar, Garik Markarian
Community Policing - A European Perspective : Strategies, Best Practices and Guidelines / / edited by P. Saskia Bayerl, Ruža Karlović, Babak Akhgar, Garik Markarian
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 271 p. 45 illus., 41 illus. in color.)
Disciplina 363.23
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Crime—Sociological aspects
Law—Europe
Social service
Terrorism
Political violence
Organization
Planning
Social media
Crime and Society
European Law
Social Work and Community Development
Terrorism and Political Violence
Social Media
ISBN 3-319-53396-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1: CP context and processes -- Introduction -- Community policing in support of social cohesion -- Fostering accountability in community policing -- Community policing: The relevance of social contexts -- CP core components -- Part 2: European CP practices and case studies -- Community policing and radicalization: Evaluation and European examples -- Police liaison approaches to managing political protest: a critical analysis of a prominent UK example -- Community policing and public perception: Belgian expectations and images of the police -- Joining forces for our security in Austrian community policing -- Security as the basis behind community policing: Croatia’s community policing approach -- Community policing case studies: proposing a social media approach -- Part 3: CP in an interconnected world -- New crime and landscapes and new technologies for community policing -- Social media: facilitator and stimulator of community policing -- Mobile communications for community policing -- Importance of cyber security -- Applying computational intelligence to community policing and forensic investigations -- Evaluation framework for CP tools -- Concluding remarks.
Record Nr. UNINA-9910255263303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Conceptual Structures for Discovering Knowledge [[electronic resource] ] : 19th International Conference on Conceptual Structures, ICCS 2011, Derby, UK, July 25-29, 2011, Proceedings / / edited by Simon Andrews, Simon Polovina, Richard Hill, Babak Akhgar
Conceptual Structures for Discovering Knowledge [[electronic resource] ] : 19th International Conference on Conceptual Structures, ICCS 2011, Derby, UK, July 25-29, 2011, Proceedings / / edited by Simon Andrews, Simon Polovina, Richard Hill, Babak Akhgar
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIV, 424 p.)
Disciplina 006.3
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Database management
Data mining
Mathematical logic
Pattern recognition
Data structures (Computer science)
Artificial Intelligence
Database Management
Data Mining and Knowledge Discovery
Mathematical Logic and Formal Languages
Pattern Recognition
Data Storage Representation
ISBN 3-642-22688-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465754503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber crime and cyber terrorism investigator's handbook / / edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers
Cyber crime and cyber terrorism investigator's handbook / / edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers
Autore Akhgar Babak
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014]
Descrizione fisica 1 online resource (xxiii, 282 pages) : illustrations
Disciplina 363.25/968
Collana Special needs offenders closeup
Soggetto topico Computer crimes - Investigation
Cyberterrorism - Investigation
ISBN 0-12-800811-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Cyber Crime and Cyber Terrorism Investigator's Handbook; Copyright; Acknowledgments; Endorsements; Contents; Contributors; Author Biography; Foreword; Preface; Chapter 1: Cyberspace: The new frontier for policing? ; The Shape of the Challenge; The Size of the Challenge; The Response; Conclusion; References; Chapter 2: Definitions of Cyber Terrorism; Introduction; The Confusion About Cyber Terrorism; Cyber Terrorism Definition; Has Cyber Terrorism ever Occurred?; Conclusions; References; Chapter 3: New and emerging threats of cyber crime and terrorism; Introduction
Some Historic MilestonesCyber security lessons not learned from previous ICT innovation cycles; Organizational aspects not learned from previous ICT innovation cycles; Emerging threats; Conclusions; References; Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes ; Introduction; Investigative Decision Making; Investigative Problem Solving; Developing Investigative Hypothesis; Investigative Innovation; Investigators Contact Management; Investigating Crime and Terror; Conclusion; References
Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigationsIntroduction; User Requirements and the Need for a User-Centered Approach?; Balancing Technological and Human Capabilities; Conducting User Requirements Elicitation; Capturing and Communicating User Requirements; Conclusion; Acknowledgment; References; Chapter 6: High-tech investigations of cyber crime; Introduction; High-Tech Investigations and Forensics; Core Concepts of High-Tech Investigations; Digital Landscapes; The "Crime Scene"; Live and Online Data Capture; Offline (Dead) Data Capture
Verification of the DataReviewing the Requirements; Starting the Analysis; Signature Analysis; Filtering Evidence; Keyword Searching; Core Evidence; Windows LNK Files; Windows Prefetch Files; Windows Event Logs; Windows Registry; Restore Points; Case Study; Summary; References; Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines ; Introduction; Establishing Crime; Collecting Evidence for a Search Warrant; Reported by a Third Party; Identification of a Suspects Internet Protocol Address; IP Spoofing; Anonymizing Proxy Relay Services
Intrusion Detection Systems, Network Traffic and Firewall LogsInterviews with Suspects; Analysis of Suspects Media; Doxing; Collecting Evidence; Seizing Equipment; Search for Written Passwords; Forensic Acquisition; Ram; Image; Forensic Analysis; Anti-forensics; RAM Analysis; Data Carving and Magic Values; Media Storage Forensics; The Structure and Format of a Hard Drive; Partitions; Master Boot Record; The VBR and BIOS parameter block; File System; File Table; Searching for Evidence; Keyword and Phrases Search; Recovering Deleted Information; Recovering Deleted Files and Folders
Recovering Deleted Partitions
Record Nr. UNINA-9910665418903321
Akhgar Babak  
Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber crime and cyber terrorism investigator's handbook / / edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers
Cyber crime and cyber terrorism investigator's handbook / / edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014]
Descrizione fisica 1 online resource (xxiii, 282 pages) : illustrations
Disciplina 363.25/968
Soggetto topico Computer crimes - Investigation
Cyberterrorism - Investigation
Soggetto genere / forma Electronic books.
ISBN 0-12-800811-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Cyber Crime and Cyber Terrorism Investigator's Handbook; Copyright; Acknowledgments; Endorsements; Contents; Contributors; Author Biography; Foreword; Preface; Chapter 1: Cyberspace: The new frontier for policing? ; The Shape of the Challenge; The Size of the Challenge; The Response; Conclusion; References; Chapter 2: Definitions of Cyber Terrorism; Introduction; The Confusion About Cyber Terrorism; Cyber Terrorism Definition; Has Cyber Terrorism ever Occurred?; Conclusions; References; Chapter 3: New and emerging threats of cyber crime and terrorism; Introduction
Some Historic MilestonesCyber security lessons not learned from previous ICT innovation cycles; Organizational aspects not learned from previous ICT innovation cycles; Emerging threats; Conclusions; References; Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes ; Introduction; Investigative Decision Making; Investigative Problem Solving; Developing Investigative Hypothesis; Investigative Innovation; Investigators Contact Management; Investigating Crime and Terror; Conclusion; References
Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigationsIntroduction; User Requirements and the Need for a User-Centered Approach?; Balancing Technological and Human Capabilities; Conducting User Requirements Elicitation; Capturing and Communicating User Requirements; Conclusion; Acknowledgment; References; Chapter 6: High-tech investigations of cyber crime; Introduction; High-Tech Investigations and Forensics; Core Concepts of High-Tech Investigations; Digital Landscapes; The "Crime Scene"; Live and Online Data Capture; Offline (Dead) Data Capture
Verification of the DataReviewing the Requirements; Starting the Analysis; Signature Analysis; Filtering Evidence; Keyword Searching; Core Evidence; Windows LNK Files; Windows Prefetch Files; Windows Event Logs; Windows Registry; Restore Points; Case Study; Summary; References; Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines ; Introduction; Establishing Crime; Collecting Evidence for a Search Warrant; Reported by a Third Party; Identification of a Suspects Internet Protocol Address; IP Spoofing; Anonymizing Proxy Relay Services
Intrusion Detection Systems, Network Traffic and Firewall LogsInterviews with Suspects; Analysis of Suspects Media; Doxing; Collecting Evidence; Seizing Equipment; Search for Written Passwords; Forensic Acquisition; Ram; Image; Forensic Analysis; Anti-forensics; RAM Analysis; Data Carving and Magic Values; Media Storage Forensics; The Structure and Format of a Hard Drive; Partitions; Master Boot Record; The VBR and BIOS parameter block; File System; File Table; Searching for Evidence; Keyword and Phrases Search; Recovering Deleted Information; Recovering Deleted Files and Folders
Recovering Deleted Partitions
Record Nr. UNINA-9910458578403321
Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Dark Web investigation / / Babak Akhgar, Marco Gercke, Stefanos Vrochidis, Helen Gibson, editors
Dark Web investigation / / Babak Akhgar, Marco Gercke, Stefanos Vrochidis, Helen Gibson, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (xvi, 288 pages)
Disciplina 364.168
Collana Security informatics and law enforcement
Soggetto topico Dark Web
ISBN 3-030-55343-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Foundations -- Chapter 1. Understanding the Dark Web -- Chapter 2. Using the Dark Web -- Chapter 3. Terrorist activities in the Dark and the Surface Web -- Chapter 4. Dark Web Markets -- Chapter 5. TENSOR: A solution to dark web investigations -- Part 2. Legal and ethical considerations -- Chapter 6. Ethical and Societal Issues of automated Dark Web Investigation - Part 1 -- Chapter 7. Ethical and Societal Issues of automated Dark Web Investigation - Part 2 -- Chapter 8. Ethical and Societal Issues of automated Dark Web Investigation - Part 3 -- Chapter 9. Ethical and Societal Issues of automated Dark Web Investigation - Part 4 -- Chapter 10. Ethical and Societal Issues of automated Dark Web Investigation - Part 5 -- Part 3. Case studies -- Chapter 11. Case studies: Darkweb markets -- Chapter 12. Case studies: Child sexual exploitation -- Chapter 13. Case study: Match fixing on the Dark Web.
Record Nr. UNISA-996464442903316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Dark Web investigation / / Babak Akhgar, Marco Gercke, Stefanos Vrochidis, Helen Gibson, editors
Dark Web investigation / / Babak Akhgar, Marco Gercke, Stefanos Vrochidis, Helen Gibson, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (xvi, 288 pages)
Disciplina 364.168
Collana Security informatics and law enforcement
Soggetto topico Dark Web
ISBN 3-030-55343-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Foundations -- Chapter 1. Understanding the Dark Web -- Chapter 2. Using the Dark Web -- Chapter 3. Terrorist activities in the Dark and the Surface Web -- Chapter 4. Dark Web Markets -- Chapter 5. TENSOR: A solution to dark web investigations -- Part 2. Legal and ethical considerations -- Chapter 6. Ethical and Societal Issues of automated Dark Web Investigation - Part 1 -- Chapter 7. Ethical and Societal Issues of automated Dark Web Investigation - Part 2 -- Chapter 8. Ethical and Societal Issues of automated Dark Web Investigation - Part 3 -- Chapter 9. Ethical and Societal Issues of automated Dark Web Investigation - Part 4 -- Chapter 10. Ethical and Societal Issues of automated Dark Web Investigation - Part 5 -- Part 3. Case studies -- Chapter 11. Case studies: Darkweb markets -- Chapter 12. Case studies: Child sexual exploitation -- Chapter 13. Case study: Match fixing on the Dark Web.
Record Nr. UNINA-9910484849503321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging trends in ICT security / / edited by Babak Akhgar, Hamid R. Arabnia
Emerging trends in ICT security / / edited by Babak Akhgar, Hamid R. Arabnia
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Morgan Kaufmann/Elsevier, , [2014]
Descrizione fisica 1 online resource (662 p.)
Disciplina 005.8
Altri autori (Persone) AkhgarBabak
ArabniaHamid
Soggetto topico Information technology - Security measures
Computer crimes - Prevention
Cyberterrorism - Prevention
Electronic surveillance
Soggetto genere / forma Electronic books.
ISBN 0-12-410487-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Emerging Trends in ICT Security; Copyright Page; Contents; Acknowledgments; Review Board; About the Editors; List of Contributors; Preface; 1 Information and Systems Security; 1 Theory/Reviews of the Field; 1 System Security Engineering for Information Systems; Introduction; System security engineering history; The system security engineering process; The revitalization of system security engineering; Established system security engineering methods, processes, and tools; Acquisition program protection planning; Information assurance; Systems engineering critical reviews
Modern and emerging system security engineering methods, processes, and tools Discovery and understanding of complex systems for security; Mission assurance; Formalized security requirements; Early design considerations; Plan for failure; Security and system patterns; Leveraging system architectures for security; Agile and self-organizing system security; Security metrics and evaluation; Identified SSE research areas; Conclusion; Recommendations; Disclaimer; Acknowledgments; References; Further reading; 2 Metrics and Indicators as Key Organizational Assets for ICT Security Assessment
Introduction GOCAME strategy overview; GOCAME conceptual framework; GOCAME process and the W5H rule; Security evaluation for a web system: A proof of concept; Target entity and information need; Security characteristic specification; Metric and indicator specifications; Implementing the M&E; Risk and security vulnerability issues; Metrics and indicators for repeatable and consistent analysis: a discussion; Related work; Conclusion and future work; References; 3 A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to...
Introduction Early breakthrough in NL IAS; The conceptual foundation of NL IAS; NL IA applications; NL watermarking; NL tamperproofing; NL sanitizing/downgrading; NL steganography and steganalysis; A sketch of ontological semantic technology; Mature semantic NL IAS; Semantic forensics; Unintended inferences and the meaning of the unsaid; Situational conceptual defaults; The term, its origins, and the canonical case; Default reversal; Are defaults really common sense knowledge?; Underdetermination of reality by language; Scripts; Anonymization; Summary; Acknowledgments; References; 2 Methods
4 An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications Introduction; UML extensions for XML security; Extensions for policy modeling and integration; Integrating local security policies into a global security policy; Assumptions and equivalence finding; Integration process for local SPSS; Resolving conflicts of integrated security rule sets; Creating the global SPSS; Related work; Conclusion; References; 5 Gamification of Information Security Awareness Training; Introduction; Literature review; General concepts; Serious games
Games adoption in multiple domains
Record Nr. UNINA-9910453222903321
Waltham, Massachusetts : , : Morgan Kaufmann/Elsevier, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging trends in ICT security / / edited by Babak Akhgar, Hamid R. Arabnia
Emerging trends in ICT security / / edited by Babak Akhgar, Hamid R. Arabnia
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA : , : Morgan Kaufmann, , 2014
Descrizione fisica 1 online resource (xxix, 631 pages) : illustrations (some color)
Disciplina 005.8
Collana Emerging trends in computer science & applied computing
Gale eBooks
Soggetto topico Information technology - Security measures
Computer crimes - Prevention
Cyberterrorism - Prevention
Electronic surveillance
ISBN 0-12-410487-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Emerging Trends in ICT Security; Copyright Page; Contents; Acknowledgments; Review Board; About the Editors; List of Contributors; Preface; 1 Information and Systems Security; 1 Theory/Reviews of the Field; 1 System Security Engineering for Information Systems; Introduction; System security engineering history; The system security engineering process; The revitalization of system security engineering; Established system security engineering methods, processes, and tools; Acquisition program protection planning; Information assurance; Systems engineering critical reviews
Modern and emerging system security engineering methods, processes, and tools Discovery and understanding of complex systems for security; Mission assurance; Formalized security requirements; Early design considerations; Plan for failure; Security and system patterns; Leveraging system architectures for security; Agile and self-organizing system security; Security metrics and evaluation; Identified SSE research areas; Conclusion; Recommendations; Disclaimer; Acknowledgments; References; Further reading; 2 Metrics and Indicators as Key Organizational Assets for ICT Security Assessment
Introduction GOCAME strategy overview; GOCAME conceptual framework; GOCAME process and the W5H rule; Security evaluation for a web system: A proof of concept; Target entity and information need; Security characteristic specification; Metric and indicator specifications; Implementing the M&E; Risk and security vulnerability issues; Metrics and indicators for repeatable and consistent analysis: a discussion; Related work; Conclusion and future work; References; 3 A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to...
Introduction Early breakthrough in NL IAS; The conceptual foundation of NL IAS; NL IA applications; NL watermarking; NL tamperproofing; NL sanitizing/downgrading; NL steganography and steganalysis; A sketch of ontological semantic technology; Mature semantic NL IAS; Semantic forensics; Unintended inferences and the meaning of the unsaid; Situational conceptual defaults; The term, its origins, and the canonical case; Default reversal; Are defaults really common sense knowledge?; Underdetermination of reality by language; Scripts; Anonymization; Summary; Acknowledgments; References; 2 Methods
4 An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications Introduction; UML extensions for XML security; Extensions for policy modeling and integration; Integrating local security policies into a global security policy; Assumptions and equivalence finding; Integration process for local SPSS; Resolving conflicts of integrated security rule sets; Creating the global SPSS; Related work; Conclusion; References; 5 Gamification of Information Security Awareness Training; Introduction; Literature review; General concepts; Serious games
Games adoption in multiple domains
Record Nr. UNINA-9910790864603321
Waltham, MA : , : Morgan Kaufmann, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui