top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Blockchain Cybersecurity, Trust and Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
Blockchain Cybersecurity, Trust and Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (VI, 290 p. 111 illus., 93 illus. in color.)
Disciplina 005.824
Collana Advances in Information Security
Soggetto topico Data protection
Computers
Artificial intelligence
Computer communication systems
Security
Information Systems and Communication Service
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-38181-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1- Blockchain in Cybersecurity Realm: An Overview -- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT -- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain -- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications -- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus -- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning -- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis -- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence -- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security -- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography -- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness -- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain -- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms -- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism.
Record Nr. UNISA-996465446403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Blockchain Cybersecurity, Trust and Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
Blockchain Cybersecurity, Trust and Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (VI, 290 p. 111 illus., 93 illus. in color.)
Disciplina 005.824
Collana Advances in Information Security
Soggetto topico Data protection
Computers
Artificial intelligence
Computer networks
Security
Information Systems and Communication Service
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-38181-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1- Blockchain in Cybersecurity Realm: An Overview -- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT -- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain -- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications -- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus -- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning -- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis -- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence -- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security -- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography -- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness -- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain -- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms -- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism.
Record Nr. UNINA-9910410057403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Contemporary digital forensic investigations of cloud and mobile applications / / edited by Kim-Kwang Raymond Choo, University of Texas at San Antonio, San Antonio, TX, United States, University of South Australia, Adelaide, SA, Australia, Ali Dehghantanha, University of Salford, Salford, United Kingdom
Contemporary digital forensic investigations of cloud and mobile applications / / edited by Kim-Kwang Raymond Choo, University of Texas at San Antonio, San Antonio, TX, United States, University of South Australia, Adelaide, SA, Australia, Ali Dehghantanha, University of Salford, Salford, United Kingdom
Autore Choo Kim-Kwang
Edizione [First edition.]
Pubbl/distr/stampa Cambridge, MA : , : Syngress, , [2017]
Descrizione fisica 1 online resource (xi, 313 pages) : illustrations (chiefly color), maps
Disciplina 004.6782
Collana Syngress advanced topics in information security
Soggetto topico Computer crimes - Investigation
Forensic sciences
Mobile communication systems
Cloud computing
Mobile computing
Mobile device forensics
ISBN 0-12-805448-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contemporary digital forensics investigations of cloud and mobile applications / K.-K.R. Choo, A. Dehghantanha -- Forensics analysis of Android mobile VoIP apps / T. Dargahi, A. Dehghantanha, M. Conti -- Investigating America Online instant messaging application : data remnants on Windows 8.1 client machine / T.Y. Yang, A. Dehghantanha, K.-K.R. Choo, Z. Muda -- Forensic investigation of social media and instant messaging services in Firefox OS : Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies / M.N. Yusoff, A. Dehghantanha, R. Mahmod -- Network traffic forensics on Firefox Mobile OS : Facebook, Twitter, and Telegram as case studies / M.N. Yusoff, A. Dehghantanha, R. Mahmod -- Mobile phone forensics : an investigative framework based on user impulsivity and secure collaboration errors / M. Petraityte, A. Dehghantanha, G. Epiphaniou -- Performance of Android forensics data recovery tools / B.C. Ogazi-Onyemaechi, A. Dehghantanha, K.-K.R. Choo -- Honeypots for employee information security awareness and education training : a conceptual EASY training model / L. Christopher, K.-K.R. Choo, A. Dehghantanha -- Implications of emerging technologies to incident handling and digital forensic strategies : a routine activity theory / N.H. Ab Rahman, G.C. Kessler, K.-K.R. Choo -- Forensic readiness : a case study on digital CCTV systems antiforensics / A. Ariffin, K.-K.R. Choo, Z. Yunos -- Forensic visualization : survey and future research directions / C. Tassone, B. Martini, K.-K.R. Choo -- Investigating storage as a service cloud platform : pCloud as a case study / T. Dargahi, A. Dehghantanha, M. Conti -- Cloud storage forensics : analysis of data remnants on SpiderOak, JustCloud, and pCloud / S.H. Mohtasebi, A. Dehghantanha, K.-K.R. Choo -- Residual cloud forensics : CloudMe and 360Yunpan as case studies / A. Dehghantanha, T. Dargahi -- An Android Cloud storage apps forensic taxonomy / M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos, A. Dehghantanha.
Record Nr. UNINA-9910583479203321
Choo Kim-Kwang  
Cambridge, MA : , : Syngress, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security Intelligence and Analytics / / edited by Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh
Cyber Security Intelligence and Analytics / / edited by Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (1,476 pages)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-030-15235-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Application of the CT Image Processing in the Urology Surgery -- Application of the Data Mining Technology in the Economic Management in the Age of Big Data -- Comprehensive Evaluation System which Adapt to the Layout of Power Facilities and the Utilization of Channel Resource Based on the New-type Urbanization -- Computer Desktop Image Compression Technology Based on the Clustering Algorithm -- Construction of the English Teaching Model Based on the Interactive Network Streaming Media -- Design and Implementation of the Image Processing Software Based on the Infrared Image Feature Matching -- Design and Implementation of the Image Processing Software Based on the Wavelet Transform -- Design and Implementation of the School Sports Management System Based on WEB -- Design and Research on the Chinese Medicine Health Management System Based on the Wireless Sensor Network -- Design of the In-depth Intelligence Education System Based on the Intercultural Communication.
Record Nr. UNINA-9910483949903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Threat Intelligence / / edited by Ali Dehghantanha, Mauro Conti, Tooska Dargahi
Cyber Threat Intelligence / / edited by Ali Dehghantanha, Mauro Conti, Tooska Dargahi
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (334 pages)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Data protection
Artificial intelligence
Computer networks
Data and Information Security
Artificial Intelligence
Computer Communication Networks
ISBN 3-319-73951-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Introduction -- 2 Machine Learning Aided Static Malware Analysis -- 3 Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Datasets and Feature Selection -- 4 Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Classification Algorithms -- 5 Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection -- 6 Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware -- 7 BoTShark - A Deep Learning Approach for Botnet Traffic Detection -- 8 A Practical Analysis of The Rise in Mobile Phishing -- 9 PDF-Malware Detection: A Survey and Taxonomy of Current Techniques -- 10 Adaptive Traffic Fingerprinting for Darknet Threat Intelligence -- 11 A Model for Android and iOS Applications Risk Calculations: CVSS Analysis and Enhancement Using Case-Control Studies -- 12 A Honeypot Proxy Framework for Deceiving Attackers with Fabricated Content -- 13 Investigating the Possibility of Data Leakage in Time of Live VM Migration -- 14 Forensics Investigation of OpenFlow-Based SDN Platforms -- 15 Mobile Forensics: A Bibliometric Analysis -- 16 Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies.
Record Nr. UNINA-9910299281403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of big data analytics and forensics / / Kim-Kwang Raymond Choo, Ali Dehghantanha, editors
Handbook of big data analytics and forensics / / Kim-Kwang Raymond Choo, Ali Dehghantanha, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (288 pages)
Disciplina 005.8
Soggetto topico Computer security
Big data
ISBN 3-030-74753-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910523003703321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of big data analytics and forensics / / Kim-Kwang Raymond Choo, Ali Dehghantanha, editors
Handbook of big data analytics and forensics / / Kim-Kwang Raymond Choo, Ali Dehghantanha, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (288 pages)
Disciplina 005.8
Soggetto topico Computer security
Big data
ISBN 3-030-74753-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464546203316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Handbook of Big Data and IoT Security / / edited by Ali Dehghantanha, Kim-Kwang Raymond Choo
Handbook of Big Data and IoT Security / / edited by Ali Dehghantanha, Kim-Kwang Raymond Choo
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (382 pages)
Disciplina 005.7
Soggetto topico Data protection
Computers
Artificial intelligence
Security
Information Systems and Communication Service
Artificial Intelligence
ISBN 3-030-10543-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Big Data and Internet of Things Security and Forensics: Challenges and Opportunities -- 2 Privacy of Big Data - a Review -- 3 A Bibliometric Analysis of Authentication and Access Control in IoT Devices -- 4 Towards Indeterminacy - Tolerant Access Control in IoT -- 5 Private Cloud Storage Forensics: Seafile as a Case Study -- 6 Distributed Filesystem Forensics: Ceph as a Case Study -- 7 Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study -- 8 Big Data Forensics: Hadoop Distributed File Systems as a Case Study -- 9 Internet of Things Camera Identi cation Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform -- 10 Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats -- 11 Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study -- 12 A Cyber Kill Chain Based Analysis of Remote Access Trojans -- 13 Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications -- 14 Bibliometric Analysis on the Rise of Cloud Security -- 15 A Bibliometric Analysis of Botnet Detection Techniques -- 16 Security in Online Games: Current Implementations and Challenges. .
Record Nr. UNINA-9910337565603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of Big Data Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Handbook of Big Data Privacy [[electronic resource] /] / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (IX, 397 p. 149 illus., 141 illus. in color.)
Disciplina 005.8
Soggetto topico Data protection
Computer organization
Artificial intelligence
Computers
Security
Computer Systems Organization and Communication Networks
Artificial Intelligence
Information Systems and Communication Service
Seguretat informàtica
Dades massives
Protecció de dades
Intel·ligència artificial
Soggetto genere / forma Llibres electrònics
ISBN 3-030-38557-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Big Data and Privacy : Challenges and Opportunities -- 2. AI and Security of Critical Infrastructure -- 3. Industrial Big Data Analytics: Challenges and Opportunities -- 4. A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid -- 5. Applications of Big Data Analytics and Machine Learning in the Internet of Things -- 6. A Comparison of State-of-the-art Machine Learning Models for OpCode-Based IoT Malware Detection -- 7. Artificial Intelligence and Security of Industrial Control Systems -- 8. Enhancing Network Security via Machine Learning: Opportunities and Challenges -- 9. Network Security and Privacy Evaluation Scheme for Cyber Physical Systems (CPS) -- 10. Anomaly Detection in Cyber-Physical Systems Using Machine Learning -- 11. Big Data Application for Security of Renewable Energy Resources -- 12. Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities -- 13. Privacy Preserving Abnormality Detection: A Deep Learning Approach.-14. Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis -- 15. A Survey on Application of Big Data in Fin Tech Banking Security and Privacy -- 16. A Hybrid Deep Generative Local Metric Learning Method For Intrusion Detection -- 17. Malware elimination impact on dynamic analysis: An experimental machine learning approach -- 18. RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features -- 19. Active Spectral Botnet Detection based on Eigenvalue Weighting -- .
Record Nr. UNISA-996465359103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Handbook of Big Data Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Handbook of Big Data Privacy / / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (IX, 397 p. 149 illus., 141 illus. in color.)
Disciplina 005.8
Soggetto topico Data protection
Computer organization
Artificial intelligence
Computers
Security
Computer Systems Organization and Communication Networks
Artificial Intelligence
Information Systems and Communication Service
Seguretat informàtica
Dades massives
Protecció de dades
Intel·ligència artificial
Soggetto genere / forma Llibres electrònics
ISBN 3-030-38557-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Big Data and Privacy : Challenges and Opportunities -- 2. AI and Security of Critical Infrastructure -- 3. Industrial Big Data Analytics: Challenges and Opportunities -- 4. A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid -- 5. Applications of Big Data Analytics and Machine Learning in the Internet of Things -- 6. A Comparison of State-of-the-art Machine Learning Models for OpCode-Based IoT Malware Detection -- 7. Artificial Intelligence and Security of Industrial Control Systems -- 8. Enhancing Network Security via Machine Learning: Opportunities and Challenges -- 9. Network Security and Privacy Evaluation Scheme for Cyber Physical Systems (CPS) -- 10. Anomaly Detection in Cyber-Physical Systems Using Machine Learning -- 11. Big Data Application for Security of Renewable Energy Resources -- 12. Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities -- 13. Privacy Preserving Abnormality Detection: A Deep Learning Approach.-14. Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis -- 15. A Survey on Application of Big Data in Fin Tech Banking Security and Privacy -- 16. A Hybrid Deep Generative Local Metric Learning Method For Intrusion Detection -- 17. Malware elimination impact on dynamic analysis: An experimental machine learning approach -- 18. RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features -- 19. Active Spectral Botnet Detection based on Eigenvalue Weighting -- .
Record Nr. UNINA-9910410051603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui