top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Big-Data Analytics and Cloud Computing : Theory, Algorithms and Applications / / edited by Marcello Trovati, Richard Hill, Ashiq Anjum, Shao Ying Zhu, Lu Liu
Big-Data Analytics and Cloud Computing : Theory, Algorithms and Applications / / edited by Marcello Trovati, Richard Hill, Ashiq Anjum, Shao Ying Zhu, Lu Liu
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (178 p.)
Disciplina 004
Soggetto topico Mathematical statistics
Computer communication systems
Computer simulation
Computer science—Mathematics
Probability and Statistics in Computer Science
Computer Communication Networks
Simulation and Modeling
Math Applications in Computer Science
ISBN 3-319-25313-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword; Preface; Overview and Goals; Organisation and Features; Target Audiences; Suggested Uses; Acknowledgements; Contents; Contributors; Part I Theory; 1 Data Quality Monitoring of Cloud Databases Based on Data Quality SLAs; 1.1 Introduction and Summary; 1.2 Background; 1.2.1 Data Quality in the Context of Big Data; 1.2.2 Cloud Computing; 1.2.3 Data Quality Monitoring in the Cloud; 1.2.4 The Challenge of Specifying a DQSLA; 1.2.5 The Infrastructure Estimation Problem; 1.3 Proposed Solutions; 1.3.1 Data Quality SLA Formalization; 1.3.2 Examples of Data Quality SLAs
1.3.3 Data Quality-Aware Service Architecture1.4 Future Research Directions; 1.5 Conclusions; References; 2 Role and Importance of Semantic Search in Big Data Governance; 2.1 Introduction; 2.2 Big Data: Promises and Challenges; 2.3 Participatory Design for Big Data; 2.4 Self-Service Discovery; 2.5 Conclusion; References; 3 Multimedia Big Data: Content Analysis and Retrieval; 3.1 Introduction; 3.2 The MapReduce Framework and Multimedia Big Data; 3.2.1 Indexing; 3.2.2 Caveats on Indexing; 3.2.3 Multiple Multimedia Processing; 3.2.4 Additional Work Required?
5 Integrating Twitter Traffic Information with Kalman Filter Models for Public Transportation Vehicle Arrival Time Prediction5.1 Introduction; 5.2 Communication Platform on Twitter; 5.3 Communication for Data Collection on Twitter; 5.4 Event Detection and Analysis: Tweets Relating to Road Incidents; 5.4.1 Twitter Data: Incident Data Set; 5.5 Methodology; 5.5.1 Time Series and Temporal Analysis of Textual Twitter; 5.6 Proposed Refined Kalman Filter (KF) Model-Based System; 5.7 Conclusion; References; 6 Data Science and Big Data Analytics at Career Builder
6.1 Carotene: A Job Title Classification System6.1.1 Occupation Taxonomies; 6.1.2 The Architecture of Carotene; 6.1.2.1 Taxonomy Discovery Using Clustering; 6.1.2.2 Coarse-Level Classification: SOC Major Classifier; 6.1.2.3 Fine-Level Classification: Proximity-Based Classifier; 6.1.3 Experimental Results and Discussion; 6.2 CARBi: A Data Science Ecosystem; 6.2.1 Accessing CB Data and Services Using WebScalding; 6.2.2 ScriptDB: Managing Hadoop Jobs; References; 7 Extraction of Bayesian Networks from Large Unstructured Datasets; 7.1 Introduction; 7.2 Text Mining; 7.2.1 Text Mining Techniques
7.2.2 General Architecture and Various Components of Text Mining
Record Nr. UNINA-9910298964403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Changing Presentation of the American Indian : : Museums and Native Cultures / / W. Richard West, Richard Hill, Michael M. Ames, Janice Clements, Evan M. Maurer, James D. Nason, David W. Penney, Jocelyn Wedll
The Changing Presentation of the American Indian : : Museums and Native Cultures / / W. Richard West, Richard Hill, Michael M. Ames, Janice Clements, Evan M. Maurer, James D. Nason, David W. Penney, Jocelyn Wedll
Autore West W. Richard
Pubbl/distr/stampa [s.l.] : , : National Museum of the American Indian, , 2004
Descrizione fisica 1 online resource
Soggetto topico Art / Museum Studies
Social Science / Indigenous Studies
Art / Indigenous Art of the Americas
Social sciences
ISBN 1-933565-25-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910557818203321
West W. Richard  
[s.l.] : , : National Museum of the American Indian, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Changing Presentation of the American Indian : : Museums and Native Cultures / / W. Richard West, Richard Hill, Michael M. Ames, Janice Clements, Evan M. Maurer, James D. Nason, David W. Penney, Jocelyn Wedll
The Changing Presentation of the American Indian : : Museums and Native Cultures / / W. Richard West, Richard Hill, Michael M. Ames, Janice Clements, Evan M. Maurer, James D. Nason, David W. Penney, Jocelyn Wedll
Autore West W. Richard
Pubbl/distr/stampa [s.l.] : , : National Museum of the American Indian, , 2004
Descrizione fisica 1 online resource
Soggetto topico Art / Museum Studies
Social Science / Indigenous Studies
Art / Indigenous Art of the Americas
Social sciences
ISBN 1-933565-25-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910688406703321
West W. Richard  
[s.l.] : , : National Museum of the American Indian, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Changing Presentation of the American Indian : : Museums and Native Cultures / / W. Richard West, Richard Hill, Michael M. Ames, Janice Clements, Evan M. Maurer, James D. Nason, David W. Penney, Jocelyn Wedll
The Changing Presentation of the American Indian : : Museums and Native Cultures / / W. Richard West, Richard Hill, Michael M. Ames, Janice Clements, Evan M. Maurer, James D. Nason, David W. Penney, Jocelyn Wedll
Autore West W. Richard
Pubbl/distr/stampa [s.l.] : , : National Museum of the American Indian, , 2004
Descrizione fisica 1 online resource
Soggetto topico Art / Museum Studies
Social Science / Indigenous Studies
Art / Indigenous Art of the Americas
Social sciences
ISBN 1-933565-25-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910852990703321
West W. Richard  
[s.l.] : , : National Museum of the American Indian, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Conceptual Structures for Discovering Knowledge [[electronic resource] ] : 19th International Conference on Conceptual Structures, ICCS 2011, Derby, UK, July 25-29, 2011, Proceedings / / edited by Simon Andrews, Simon Polovina, Richard Hill, Babak Akhgar
Conceptual Structures for Discovering Knowledge [[electronic resource] ] : 19th International Conference on Conceptual Structures, ICCS 2011, Derby, UK, July 25-29, 2011, Proceedings / / edited by Simon Andrews, Simon Polovina, Richard Hill, Babak Akhgar
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIV, 424 p.)
Disciplina 006.3
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Database management
Data mining
Mathematical logic
Pattern recognition
Data structures (Computer science)
Artificial Intelligence
Database Management
Data Mining and Knowledge Discovery
Mathematical Logic and Formal Languages
Pattern Recognition
Data Storage Representation
ISBN 3-642-22688-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465754503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
For the inhabitants of Worcester to view and consider well of, especially they of Nicholas-Parish [[electronic resource] ] : The case of us, viz. Edward Bourne, John Knight, Joseph Allibon and Richard Hill, of Nicholas-Parish in the city of Worcester
For the inhabitants of Worcester to view and consider well of, especially they of Nicholas-Parish [[electronic resource] ] : The case of us, viz. Edward Bourne, John Knight, Joseph Allibon and Richard Hill, of Nicholas-Parish in the city of Worcester
Autore Bourne Edward <d. 1708.>
Pubbl/distr/stampa [Worcester?, : s.n., 1682]
Descrizione fisica 6, [1] p
Altri autori (Persone) KnightJohn
AllibonJoseph
HillRichard
Soggetto topico Quakers - England - Worcester
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996384136603316
Bourne Edward <d. 1708.>  
[Worcester?, : s.n., 1682]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Guide to Security Assurance for Cloud Computing / / edited by Shao Ying Zhu, Richard Hill, Marcello Trovati
Guide to Security Assurance for Cloud Computing / / edited by Shao Ying Zhu, Richard Hill, Marcello Trovati
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 229 p. 39 illus.)
Disciplina 005.8
Collana Computer Communications and Networks
Soggetto topico Computer security
Computer communication systems
Management information systems
Computer science
Systems and Data Security
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-319-25988-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Preface -- Overview and Goals -- Organisation and Features -- Target Audiences -- Suggested Uses -- Acknowledgements -- Contents -- Contributors -- About the Editors -- Part I Key Concepts -- 1 Privacy, Compliance and the Cloud -- 1.1 Introduction -- 1.2 Compliance: The State of the Art -- 1.3 Compliance: Emerging Standards -- 1.4 Compliance: Future Work -- 1.5 How Effective Is the Compliance Model? -- 1.6 Concluding Remarks -- 1.7 Review Questions -- References -- 2 Cryptographic Tools for Cloud Environments -- 2.1 Introduction -- 2.2 Fundamental Cryptographic Mechanisms -- 2.2.1 Symmetric Encryption -- 2.2.2 Public-Key Encryption -- 2.2.3 Hash Functions -- 2.2.4 Message Authentication Codes -- 2.2.5 Digital Signature Schemes -- 2.2.6 Authenticated Encryption -- 2.3 Limitations of Conventional Cryptography -- 2.4 Cryptographic Mechanisms for the Cloud -- 2.4.1 Processing Encrypted Data -- 2.4.1.1 Searching Over Encrypted Data -- 2.4.1.2 Homomorphic Encryption -- 2.4.1.3 Computing Aggregates Over Encrypted Data -- 2.4.1.4 Order-Preserving Encryption -- 2.4.2 Functional Encryption -- 2.4.2.1 Identity-Based Encryption -- 2.4.2.2 Attribute-Based Encryption -- 2.4.2.3 Predicate Encryption -- 2.4.3 Verifiable Computing -- 2.4.3.1 Verifiable Outsourced Computation -- 2.4.3.2 Verifiable Storage -- 2.4.4 Other Tools -- 2.4.4.1 Proxy Re-encryption -- 2.4.4.2 Oblivious RAM -- 2.4.4.3 Format-Preserving Encryption -- 2.4.4.4 Secure Deduplication -- 2.5 Closing Remarks -- 2.6 Review Questions -- References -- 3 Migrating to Public Clouds - From a Security Perspective -- 3.1 Introduction -- 3.2 Clouds and Features -- 3.3 Migration Concerns -- 3.4 Security and Privacy in Public Clouds -- 3.5 Migrating to Public Clouds - An Experimental Analysis -- 3.5.1 Research Design -- 3.5.2 Statistical Analysis -- 3.6 Results and Interpretation.
3.6.1 Question 1 -- 3.6.2 Question 2 -- 3.6.3 Question 3 -- 3.6.4 Question 4 -- 3.6.5 Question 5 -- 3.6.6 Question 6 -- 3.6.7 Question 7 -- 3.7 Summary -- 3.8 Conclusion -- 3.9 Review Questions -- References -- 4 Virtualization Security in Cloud Computing -- 4.1 Introduction -- 4.2 Virtualization -- 4.3 Virtualization Security -- 4.4 Virtualization Attacks -- 4.4.1 Hypervisor Attacks -- 4.4.2 Virtual Machine Attacks -- 4.4.3 Disk Image Attacks -- 4.5 Security Solutions -- 4.5.1 Hypervisor Security -- 4.5.2 Virtual Machine Security -- 4.5.3 Disk Images Security -- 4.6 Recommendations for Secure Usage of Virtual Machines -- 4.6.1 Secure Network -- 4.6.2 Disabling the Non-required Features -- 4.6.3 Disconnect Unused Hardware Devices -- 4.6.4 Backup of Virtual Machine Images -- 4.6.5 Hardening of Virtual Machines -- 4.6.6 Auditing -- 4.7 Industrial Survey -- 4.7.1 Storage Made Easy -- 4.7.2 Piston Cloud -- 4.7.3 Metacloud -- 4.8 Conclusion -- 4.9 Review Questions -- References -- 5 Security of Cloud-Based Storage -- 5.1 Introduction to Cloud Storage -- 5.2 Organization -- 5.3 Cloud Storage Architecture -- 5.4 Cloud Storage Security Architecture -- 5.5 Deduplication for Efficient Storage -- 5.6 Techniques Used for Maintaining Security in Cloud Storage -- 5.7 Comparison Between Various Available Secure Cloud Storage Techniques -- 5.7.1 Cloud Storage Techniques of Category A -- 5.7.1.1 ESPAC Scheme -- 5.7.1.2 Kamara et al.'s Scheme -- 5.7.1.3 Key to Cloud (K2C) Scheme -- 5.7.1.4 Cryptonite Scheme -- 5.7.1.5 Sec2 Scheme -- 5.7.2 Cloud Storage Techniques of Category B -- 5.7.2.1 Chow et al.'s Scheme -- 5.7.2.2 Cloud Storage System (CS2) -- 5.8 Security-Related Case Studies in Cloud Storage -- 5.8.1 Dropbox -- 5.8.2 Microsoft Azure -- 5.8.3 Amazon EC2 -- 5.9 Security Guidelines for Cloud Storage -- 5.9.1 Login Credential Safety.
5.9.2 Encryption of the Stored Data -- 5.9.3 Security Along with Deduplication -- 5.9.4 Transport Security -- 5.9.5 Multiple Devices Accessibility -- 5.9.6 Update Functionality of System -- 5.10 Summary -- 5.11 Review Questions -- References -- 6 Cloud Computing Governance, Risk, and Compliance - The Quintessential Globalization Challenge -- 6.1 Industry Buy-in, Consensus, and Reciprocity -- 6.2 Definitions -- 6.3 Governance Focus Areas -- 6.4 Organizations and Standards -- 6.4.1 Industry Community Groups -- 6.4.2 FEDRAMP -- 6.4.3 ISO -- 6.4.3.1 ISO 9001:2015 -- 6.4.3.2 ISO 12207:2008 -- 6.4.3.3 ISO 15504:2012 -- 6.4.3.4 ISO 20000-1:2011 -- 6.4.3.5 ISO 26262:2011 -- 6.4.3.6 ISO 27000 Series -- 6.5 Way Forward -- 6.6 Review Questions -- References -- 7 Cloud Computing and Security in the Future -- 7.1 Introduction -- 7.2 The Cloud Model -- 7.3 Privacy and Security -- 7.4 The Data Protection Act and Cloud Computing -- 7.5 The Future -- 7.6 Conclusion -- 7.7 Review Questions -- References -- Part II Application and Approaches -- 8 Security Certification for the Cloud: The CUMULUS Approach -- 8.1 Introduction -- 8.2 Certification Process and Framework Architecture -- 8.2.1 CM Instance and CM Template -- 8.2.2 Certification Process -- 8.2.3 Architecture -- 8.3 Basic Certification Models -- 8.3.1 Monitoring-Based Certification Models -- 8.3.2 Test-Based Certification Models -- 8.3.3 TC-Based Certification Models -- 8.4 Advanced Certification Models -- 8.4.1 Hybrid Certification Models -- 8.4.2 Compositional Certification Models -- 8.4.3 Incremental Certification Models -- 8.4.3.1 CM Instance Adaptation -- 8.4.3.2 CM Template Adaptation -- 8.5 Trust Model -- 8.6 Related Work -- 8.7 Conclusions -- 8.8 Review Questions -- References -- 9 Improving Cloud Assurance and Transparency Through Accountability Mechanisms -- 9.1 Introduction -- 9.2 State of the Art.
9.3 The Relationship Between Accountability and Assurance -- 9.4 Case Study -- 9.5 Risk Assessment -- 9.6 Service Level Agreements -- 9.6.1 Importance of secSLAs and PLAs for Cloud Transparency -- 9.6.2 How Are secSLAs and PLAs Structured? -- 9.7 Continuous Assurance During Service Provision -- 9.8 Example Tools -- 9.8.1 Phase 1: Provisioning for Accountability -- 9.8.1.1 Cloud Offerings Advisory Tool (COAT) -- 9.8.1.2 Data Protection Impact Assessment Tool (DPIAT) -- 9.8.2 Phase 2: Operating in an Accountable Manner -- 9.8.3 Phase 3: Audit and Validate -- 9.8.4 Architecture of the Audit Agent System -- 9.8.4.1 Input: Audit Policy Module (APM) -- 9.8.4.2 Runtime Management: Audit Agent Controller (AAC) -- 9.8.4.3 Collection and Storage: Evidence Collection Agents and Evidence Store -- 9.8.4.4 Processing and Presentation: Evidence Processor and Presenter -- 9.9 Conclusions -- 9.10 Review Questions -- References -- 10 DDoS Protection and Security Assurance in Cloud -- 10.1 Introduction -- 10.2 DDoS in Cloud Computing -- 10.2.1 History and Recent Incidents -- 10.2.2 DDoS on Fixed Infrastructure -- 10.2.3 DDoS on Cloud Infrastructure -- 10.3 Attack Model and Threat Model -- 10.3.1 Attack Model -- 10.3.2 Threat Model -- 10.4 System Model -- 10.5 DDoS Protection in Cloud -- 10.5.1 DDoS Prevention Methods -- 10.5.2 Anomaly Detection -- 10.5.3 Resource Allocation-Based Methods -- 10.6 DDoS Security Assurance in Cloud -- 10.7 Chapter Summary -- 10.8 Review Questions -- References -- 11 Cloud Data Auditing Using Proofs of Retrievability -- 11.1 Introduction -- 11.2 Preliminaries -- 11.2.1 Notation -- 11.2.2 Message Authentication Code (MAC) -- 11.2.3 Bilinear Maps -- 11.2.4 Digital Signature -- 11.2.5 Erasure Code -- 11.2.6 Oblivious RAM -- 11.2.7 Proofs of Retrievability -- 11.3 Proofs of Retrievability for Static Data.
11.3.1 POR Scheme by Juels and Kaliski -- 11.3.2 POR Schemes by Shacham and Waters -- 11.3.2.1 POR Scheme with Private Verification -- 11.3.2.2 POR Scheme with Public Verification -- 11.4 Proofs of Retrievability for Dynamic Data -- 11.4.1 POR Scheme by Cash, Küpçü and Wichs -- 11.4.2 POR Scheme by Shi, Stefanov, and Papamanthou -- 11.5 Conclusion -- 11.6 Review Questions -- References -- 12 Vehicular Cloud Networks: Architecture and Security -- 12.1 Cloud Computing -- 12.2 Vehicular Ad Hoc Networks (VANET) -- 12.2.1 VANET Architecture -- 12.2.2 Components of VANET -- 12.2.3 Important Characteristics of VANET -- 12.2.3.1 Decentralized Systems -- 12.2.3.2 High-Speed Mobility and Dynamic Topology -- 12.2.3.3 Cooperative Message Routing -- 12.2.3.4 Real-Time Processing -- 12.2.3.5 User and Data Privacy -- 12.3 Vehicular Cloud Networking (VCN) -- 12.3.1 Vehicular-Based Cloud Networking (VCN) Architecture -- 12.3.2 Vehicular-Based Cloud Networking (VCN) Operation -- 12.4 Threats in Vehicular-Based Cloud Networking -- 12.4.1 Threats to Tier-1 and Tier-2 Clouds -- 12.4.1.1 Vehicle -- 12.4.1.2 Adjacent Infrastructure -- 12.4.1.3 Wireless Communication -- 12.4.1.4 Messages -- 12.4.1.5 Vehicular Cloud -- 12.4.1.6 Infrastructure Cloud -- 12.4.2 Threats to Tier-3 Cloud -- 12.4.2.1 Data Breaches -- 12.4.2.2 Data Loss -- 12.4.2.3 Account or Service Hijacking -- 12.4.2.4 Denial of Service -- 12.4.2.5 Insecure Interfaces and APIs -- 12.4.2.6 Malicious Insider -- 12.4.2.7 Abuse of Cloud Services -- 12.4.2.8 Shared Technology Vulnerabilities -- 12.5 Review Questions -- References -- Index.
Record Nr. UNINA-9910298966203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guide to Security in SDN and NFV : Challenges, Opportunities, and Applications / / edited by Shao Ying Zhu, Sandra Scott-Hayward, Ludovic Jacquin, Richard Hill
Guide to Security in SDN and NFV : Challenges, Opportunities, and Applications / / edited by Shao Ying Zhu, Sandra Scott-Hayward, Ludovic Jacquin, Richard Hill
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXII, 331 p. 78 illus.)
Disciplina 004.6
Collana Computer Communications and Networks
Soggetto topico Computer communication systems
Computer security
Data encryption (Computer science)
Computer Communication Networks
Systems and Data Security
Cryptology
ISBN 3-319-64653-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Introduction to Security in SDNFV – Key Concepts -- Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies -- NFV Security: Emerging Technologies and Standards -- SDN and NFV Security: Challenges for Integrated Solutions -- Trust in SDN/NFV Environments -- Part II: SDNFV Security Challenges and Network Security Solutions -- Practical Experience in NFV Security Field: Virtual Home Gateway -- A Security Policy Transition Framework for Software-Defined Networks -- SDNFV-Based DDoS Detection and Remediation in Multi-Tenant, Virtualized Infrastructures -- SHIELD – Securing Against Intruders and Other Threats Through a NFV-Enabled Environment -- Part III: Security Implications of SDNFV in Future Networks -- Addressing Industry 4.0 Security by Software-Defined Networking -- Security Requirements for Multi-Operator Virtualized Network and Service Orchestration for 5G -- Improving Security in Coalition Tactical Environments Using an SDN Approach -- A SDN and NFV Use-Case: NDN Implementation and Security Monitoring.
Record Nr. UNINA-9910254829803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guide to Vulnerability Analysis for Computer Networks and Systems : An Artificial Intelligence Approach / / edited by Simon Parkinson, Andrew Crampton, Richard Hill
Guide to Vulnerability Analysis for Computer Networks and Systems : An Artificial Intelligence Approach / / edited by Simon Parkinson, Andrew Crampton, Richard Hill
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (381 pages)
Disciplina 005.8
Collana Computer Communications and Networks
Soggetto topico Computer communication systems
Computer security
Computer software—Reusability
Computers
Cognitive psychology
ISBN 3-319-92624-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Introduction and State of the Art -- Review of the State of the Art of Vulnerability Assessment Using Artificial Intelligence -- A Survey of Machine Learning Algorithms and Their Application in Information Security -- Part II: Vulnerability Assessment Frameworks -- Vulnerability Assessment of Cybersecurity for SCADA Systems -- A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection -- AI and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection -- Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications -- Part III: Applications of Artificial Intelligence -- Automated Planning of Administrative Tasks Using Historic Events: a File System Case Study -- Defending Against Chained Cyber-Attacks by Adversarial Agents -- Vulnerability Detection and Analysis in Adversarial Deep Learning -- SOCIO-LENS: Spotting Unsolicited Callers Through Network Analysis -- Function Call Graphs Versus Machine Learning for Malware Detection -- Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models -- Masquerade Detection on Mobile Devices -- Identifying File Interaction Patterns in Ransomware Behaviour -- Part IV: Visualisation -- A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN -- Big Data and Cyber Security: A Visual Analytics Perspective.
Record Nr. UNINA-9910299313403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Polices d’Empires : XVIIIe-XIXe siècles / / Catherine Denys, Vincent Denis
Polices d’Empires : XVIIIe-XIXe siècles / / Catherine Denys, Vincent Denis
Autore Bicalho Maria Fernanda
Pubbl/distr/stampa Rennes, : Presses universitaires de Rennes, 2019
Descrizione fisica 1 online resource (196 p.)
Altri autori (Persone) BlanchardEmmanuel
BloembergenMarieke
DenisVincent
DenysCatherine
DoyleMark
FysonDonald
GaleanoDiego
GiulianiErin
HillRichard
KlinkersEllen
PetrowStefan
SpencerScott C
Soggetto topico History
Political Science Public Admin. & Development
police
colonie
empire
surveillance
forces de l'ordre
identification
Soggetto non controllato forces de l'ordre
police
colonie
identification
empire
surveillance
ISBN 2-7535-6897-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione fre
Record Nr. UNINA-9910330712603321
Bicalho Maria Fernanda  
Rennes, : Presses universitaires de Rennes, 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui