Big-Data Analytics and Cloud Computing : Theory, Algorithms and Applications / / edited by Marcello Trovati, Richard Hill, Ashiq Anjum, Shao Ying Zhu, Lu Liu |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (178 p.) |
Disciplina | 004 |
Soggetto topico |
Mathematical statistics
Computer communication systems Computer simulation Computer science—Mathematics Probability and Statistics in Computer Science Computer Communication Networks Simulation and Modeling Math Applications in Computer Science |
ISBN | 3-319-25313-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Foreword; Preface; Overview and Goals; Organisation and Features; Target Audiences; Suggested Uses; Acknowledgements; Contents; Contributors; Part I Theory; 1 Data Quality Monitoring of Cloud Databases Based on Data Quality SLAs; 1.1 Introduction and Summary; 1.2 Background; 1.2.1 Data Quality in the Context of Big Data; 1.2.2 Cloud Computing; 1.2.3 Data Quality Monitoring in the Cloud; 1.2.4 The Challenge of Specifying a DQSLA; 1.2.5 The Infrastructure Estimation Problem; 1.3 Proposed Solutions; 1.3.1 Data Quality SLA Formalization; 1.3.2 Examples of Data Quality SLAs
1.3.3 Data Quality-Aware Service Architecture1.4 Future Research Directions; 1.5 Conclusions; References; 2 Role and Importance of Semantic Search in Big Data Governance; 2.1 Introduction; 2.2 Big Data: Promises and Challenges; 2.3 Participatory Design for Big Data; 2.4 Self-Service Discovery; 2.5 Conclusion; References; 3 Multimedia Big Data: Content Analysis and Retrieval; 3.1 Introduction; 3.2 The MapReduce Framework and Multimedia Big Data; 3.2.1 Indexing; 3.2.2 Caveats on Indexing; 3.2.3 Multiple Multimedia Processing; 3.2.4 Additional Work Required? 5 Integrating Twitter Traffic Information with Kalman Filter Models for Public Transportation Vehicle Arrival Time Prediction5.1 Introduction; 5.2 Communication Platform on Twitter; 5.3 Communication for Data Collection on Twitter; 5.4 Event Detection and Analysis: Tweets Relating to Road Incidents; 5.4.1 Twitter Data: Incident Data Set; 5.5 Methodology; 5.5.1 Time Series and Temporal Analysis of Textual Twitter; 5.6 Proposed Refined Kalman Filter (KF) Model-Based System; 5.7 Conclusion; References; 6 Data Science and Big Data Analytics at Career Builder 6.1 Carotene: A Job Title Classification System6.1.1 Occupation Taxonomies; 6.1.2 The Architecture of Carotene; 6.1.2.1 Taxonomy Discovery Using Clustering; 6.1.2.2 Coarse-Level Classification: SOC Major Classifier; 6.1.2.3 Fine-Level Classification: Proximity-Based Classifier; 6.1.3 Experimental Results and Discussion; 6.2 CARBi: A Data Science Ecosystem; 6.2.1 Accessing CB Data and Services Using WebScalding; 6.2.2 ScriptDB: Managing Hadoop Jobs; References; 7 Extraction of Bayesian Networks from Large Unstructured Datasets; 7.1 Introduction; 7.2 Text Mining; 7.2.1 Text Mining Techniques 7.2.2 General Architecture and Various Components of Text Mining |
Record Nr. | UNINA-9910298964403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Changing Presentation of the American Indian : : Museums and Native Cultures / / W. Richard West, Richard Hill, Michael M. Ames, Janice Clements, Evan M. Maurer, James D. Nason, David W. Penney, Jocelyn Wedll |
Autore | West W. Richard |
Pubbl/distr/stampa | [s.l.] : , : National Museum of the American Indian, , 2004 |
Descrizione fisica | 1 online resource |
Soggetto topico |
Art / Museum Studies
Social Science / Indigenous Studies Art / Indigenous Art of the Americas Social sciences |
ISBN | 1-933565-25-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910557818203321 |
West W. Richard | ||
[s.l.] : , : National Museum of the American Indian, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Changing Presentation of the American Indian : : Museums and Native Cultures / / W. Richard West, Richard Hill, Michael M. Ames, Janice Clements, Evan M. Maurer, James D. Nason, David W. Penney, Jocelyn Wedll |
Autore | West W. Richard |
Pubbl/distr/stampa | [s.l.] : , : National Museum of the American Indian, , 2004 |
Descrizione fisica | 1 online resource |
Soggetto topico |
Art / Museum Studies
Social Science / Indigenous Studies Art / Indigenous Art of the Americas Social sciences |
ISBN | 1-933565-25-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910688406703321 |
West W. Richard | ||
[s.l.] : , : National Museum of the American Indian, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Changing Presentation of the American Indian : : Museums and Native Cultures / / W. Richard West, Richard Hill, Michael M. Ames, Janice Clements, Evan M. Maurer, James D. Nason, David W. Penney, Jocelyn Wedll |
Autore | West W. Richard |
Pubbl/distr/stampa | [s.l.] : , : National Museum of the American Indian, , 2004 |
Descrizione fisica | 1 online resource |
Soggetto topico |
Art / Museum Studies
Social Science / Indigenous Studies Art / Indigenous Art of the Americas Social sciences |
ISBN | 1-933565-25-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910852990703321 |
West W. Richard | ||
[s.l.] : , : National Museum of the American Indian, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Conceptual Structures for Discovering Knowledge [[electronic resource] ] : 19th International Conference on Conceptual Structures, ICCS 2011, Derby, UK, July 25-29, 2011, Proceedings / / edited by Simon Andrews, Simon Polovina, Richard Hill, Babak Akhgar |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XIV, 424 p.) |
Disciplina | 006.3 |
Collana | Lecture Notes in Artificial Intelligence |
Soggetto topico |
Artificial intelligence
Database management Data mining Mathematical logic Pattern recognition Data structures (Computer science) Artificial Intelligence Database Management Data Mining and Knowledge Discovery Mathematical Logic and Formal Languages Pattern Recognition Data Storage Representation |
ISBN | 3-642-22688-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465754503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
For the inhabitants of Worcester to view and consider well of, especially they of Nicholas-Parish [[electronic resource] ] : The case of us, viz. Edward Bourne, John Knight, Joseph Allibon and Richard Hill, of Nicholas-Parish in the city of Worcester |
Autore | Bourne Edward <d. 1708.> |
Pubbl/distr/stampa | [Worcester?, : s.n., 1682] |
Descrizione fisica | 6, [1] p |
Altri autori (Persone) |
KnightJohn
AllibonJoseph HillRichard |
Soggetto topico | Quakers - England - Worcester |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996384136603316 |
Bourne Edward <d. 1708.> | ||
[Worcester?, : s.n., 1682] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Guide to Security Assurance for Cloud Computing / / edited by Shao Ying Zhu, Richard Hill, Marcello Trovati |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVIII, 229 p. 39 illus.) |
Disciplina | 005.8 |
Collana | Computer Communications and Networks |
Soggetto topico |
Computer security
Computer communication systems Management information systems Computer science Systems and Data Security Computer Communication Networks Management of Computing and Information Systems |
ISBN | 3-319-25988-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Foreword -- Preface -- Overview and Goals -- Organisation and Features -- Target Audiences -- Suggested Uses -- Acknowledgements -- Contents -- Contributors -- About the Editors -- Part I Key Concepts -- 1 Privacy, Compliance and the Cloud -- 1.1 Introduction -- 1.2 Compliance: The State of the Art -- 1.3 Compliance: Emerging Standards -- 1.4 Compliance: Future Work -- 1.5 How Effective Is the Compliance Model? -- 1.6 Concluding Remarks -- 1.7 Review Questions -- References -- 2 Cryptographic Tools for Cloud Environments -- 2.1 Introduction -- 2.2 Fundamental Cryptographic Mechanisms -- 2.2.1 Symmetric Encryption -- 2.2.2 Public-Key Encryption -- 2.2.3 Hash Functions -- 2.2.4 Message Authentication Codes -- 2.2.5 Digital Signature Schemes -- 2.2.6 Authenticated Encryption -- 2.3 Limitations of Conventional Cryptography -- 2.4 Cryptographic Mechanisms for the Cloud -- 2.4.1 Processing Encrypted Data -- 2.4.1.1 Searching Over Encrypted Data -- 2.4.1.2 Homomorphic Encryption -- 2.4.1.3 Computing Aggregates Over Encrypted Data -- 2.4.1.4 Order-Preserving Encryption -- 2.4.2 Functional Encryption -- 2.4.2.1 Identity-Based Encryption -- 2.4.2.2 Attribute-Based Encryption -- 2.4.2.3 Predicate Encryption -- 2.4.3 Verifiable Computing -- 2.4.3.1 Verifiable Outsourced Computation -- 2.4.3.2 Verifiable Storage -- 2.4.4 Other Tools -- 2.4.4.1 Proxy Re-encryption -- 2.4.4.2 Oblivious RAM -- 2.4.4.3 Format-Preserving Encryption -- 2.4.4.4 Secure Deduplication -- 2.5 Closing Remarks -- 2.6 Review Questions -- References -- 3 Migrating to Public Clouds - From a Security Perspective -- 3.1 Introduction -- 3.2 Clouds and Features -- 3.3 Migration Concerns -- 3.4 Security and Privacy in Public Clouds -- 3.5 Migrating to Public Clouds - An Experimental Analysis -- 3.5.1 Research Design -- 3.5.2 Statistical Analysis -- 3.6 Results and Interpretation.
3.6.1 Question 1 -- 3.6.2 Question 2 -- 3.6.3 Question 3 -- 3.6.4 Question 4 -- 3.6.5 Question 5 -- 3.6.6 Question 6 -- 3.6.7 Question 7 -- 3.7 Summary -- 3.8 Conclusion -- 3.9 Review Questions -- References -- 4 Virtualization Security in Cloud Computing -- 4.1 Introduction -- 4.2 Virtualization -- 4.3 Virtualization Security -- 4.4 Virtualization Attacks -- 4.4.1 Hypervisor Attacks -- 4.4.2 Virtual Machine Attacks -- 4.4.3 Disk Image Attacks -- 4.5 Security Solutions -- 4.5.1 Hypervisor Security -- 4.5.2 Virtual Machine Security -- 4.5.3 Disk Images Security -- 4.6 Recommendations for Secure Usage of Virtual Machines -- 4.6.1 Secure Network -- 4.6.2 Disabling the Non-required Features -- 4.6.3 Disconnect Unused Hardware Devices -- 4.6.4 Backup of Virtual Machine Images -- 4.6.5 Hardening of Virtual Machines -- 4.6.6 Auditing -- 4.7 Industrial Survey -- 4.7.1 Storage Made Easy -- 4.7.2 Piston Cloud -- 4.7.3 Metacloud -- 4.8 Conclusion -- 4.9 Review Questions -- References -- 5 Security of Cloud-Based Storage -- 5.1 Introduction to Cloud Storage -- 5.2 Organization -- 5.3 Cloud Storage Architecture -- 5.4 Cloud Storage Security Architecture -- 5.5 Deduplication for Efficient Storage -- 5.6 Techniques Used for Maintaining Security in Cloud Storage -- 5.7 Comparison Between Various Available Secure Cloud Storage Techniques -- 5.7.1 Cloud Storage Techniques of Category A -- 5.7.1.1 ESPAC Scheme -- 5.7.1.2 Kamara et al.'s Scheme -- 5.7.1.3 Key to Cloud (K2C) Scheme -- 5.7.1.4 Cryptonite Scheme -- 5.7.1.5 Sec2 Scheme -- 5.7.2 Cloud Storage Techniques of Category B -- 5.7.2.1 Chow et al.'s Scheme -- 5.7.2.2 Cloud Storage System (CS2) -- 5.8 Security-Related Case Studies in Cloud Storage -- 5.8.1 Dropbox -- 5.8.2 Microsoft Azure -- 5.8.3 Amazon EC2 -- 5.9 Security Guidelines for Cloud Storage -- 5.9.1 Login Credential Safety. 5.9.2 Encryption of the Stored Data -- 5.9.3 Security Along with Deduplication -- 5.9.4 Transport Security -- 5.9.5 Multiple Devices Accessibility -- 5.9.6 Update Functionality of System -- 5.10 Summary -- 5.11 Review Questions -- References -- 6 Cloud Computing Governance, Risk, and Compliance - The Quintessential Globalization Challenge -- 6.1 Industry Buy-in, Consensus, and Reciprocity -- 6.2 Definitions -- 6.3 Governance Focus Areas -- 6.4 Organizations and Standards -- 6.4.1 Industry Community Groups -- 6.4.2 FEDRAMP -- 6.4.3 ISO -- 6.4.3.1 ISO 9001:2015 -- 6.4.3.2 ISO 12207:2008 -- 6.4.3.3 ISO 15504:2012 -- 6.4.3.4 ISO 20000-1:2011 -- 6.4.3.5 ISO 26262:2011 -- 6.4.3.6 ISO 27000 Series -- 6.5 Way Forward -- 6.6 Review Questions -- References -- 7 Cloud Computing and Security in the Future -- 7.1 Introduction -- 7.2 The Cloud Model -- 7.3 Privacy and Security -- 7.4 The Data Protection Act and Cloud Computing -- 7.5 The Future -- 7.6 Conclusion -- 7.7 Review Questions -- References -- Part II Application and Approaches -- 8 Security Certification for the Cloud: The CUMULUS Approach -- 8.1 Introduction -- 8.2 Certification Process and Framework Architecture -- 8.2.1 CM Instance and CM Template -- 8.2.2 Certification Process -- 8.2.3 Architecture -- 8.3 Basic Certification Models -- 8.3.1 Monitoring-Based Certification Models -- 8.3.2 Test-Based Certification Models -- 8.3.3 TC-Based Certification Models -- 8.4 Advanced Certification Models -- 8.4.1 Hybrid Certification Models -- 8.4.2 Compositional Certification Models -- 8.4.3 Incremental Certification Models -- 8.4.3.1 CM Instance Adaptation -- 8.4.3.2 CM Template Adaptation -- 8.5 Trust Model -- 8.6 Related Work -- 8.7 Conclusions -- 8.8 Review Questions -- References -- 9 Improving Cloud Assurance and Transparency Through Accountability Mechanisms -- 9.1 Introduction -- 9.2 State of the Art. 9.3 The Relationship Between Accountability and Assurance -- 9.4 Case Study -- 9.5 Risk Assessment -- 9.6 Service Level Agreements -- 9.6.1 Importance of secSLAs and PLAs for Cloud Transparency -- 9.6.2 How Are secSLAs and PLAs Structured? -- 9.7 Continuous Assurance During Service Provision -- 9.8 Example Tools -- 9.8.1 Phase 1: Provisioning for Accountability -- 9.8.1.1 Cloud Offerings Advisory Tool (COAT) -- 9.8.1.2 Data Protection Impact Assessment Tool (DPIAT) -- 9.8.2 Phase 2: Operating in an Accountable Manner -- 9.8.3 Phase 3: Audit and Validate -- 9.8.4 Architecture of the Audit Agent System -- 9.8.4.1 Input: Audit Policy Module (APM) -- 9.8.4.2 Runtime Management: Audit Agent Controller (AAC) -- 9.8.4.3 Collection and Storage: Evidence Collection Agents and Evidence Store -- 9.8.4.4 Processing and Presentation: Evidence Processor and Presenter -- 9.9 Conclusions -- 9.10 Review Questions -- References -- 10 DDoS Protection and Security Assurance in Cloud -- 10.1 Introduction -- 10.2 DDoS in Cloud Computing -- 10.2.1 History and Recent Incidents -- 10.2.2 DDoS on Fixed Infrastructure -- 10.2.3 DDoS on Cloud Infrastructure -- 10.3 Attack Model and Threat Model -- 10.3.1 Attack Model -- 10.3.2 Threat Model -- 10.4 System Model -- 10.5 DDoS Protection in Cloud -- 10.5.1 DDoS Prevention Methods -- 10.5.2 Anomaly Detection -- 10.5.3 Resource Allocation-Based Methods -- 10.6 DDoS Security Assurance in Cloud -- 10.7 Chapter Summary -- 10.8 Review Questions -- References -- 11 Cloud Data Auditing Using Proofs of Retrievability -- 11.1 Introduction -- 11.2 Preliminaries -- 11.2.1 Notation -- 11.2.2 Message Authentication Code (MAC) -- 11.2.3 Bilinear Maps -- 11.2.4 Digital Signature -- 11.2.5 Erasure Code -- 11.2.6 Oblivious RAM -- 11.2.7 Proofs of Retrievability -- 11.3 Proofs of Retrievability for Static Data. 11.3.1 POR Scheme by Juels and Kaliski -- 11.3.2 POR Schemes by Shacham and Waters -- 11.3.2.1 POR Scheme with Private Verification -- 11.3.2.2 POR Scheme with Public Verification -- 11.4 Proofs of Retrievability for Dynamic Data -- 11.4.1 POR Scheme by Cash, Küpçü and Wichs -- 11.4.2 POR Scheme by Shi, Stefanov, and Papamanthou -- 11.5 Conclusion -- 11.6 Review Questions -- References -- 12 Vehicular Cloud Networks: Architecture and Security -- 12.1 Cloud Computing -- 12.2 Vehicular Ad Hoc Networks (VANET) -- 12.2.1 VANET Architecture -- 12.2.2 Components of VANET -- 12.2.3 Important Characteristics of VANET -- 12.2.3.1 Decentralized Systems -- 12.2.3.2 High-Speed Mobility and Dynamic Topology -- 12.2.3.3 Cooperative Message Routing -- 12.2.3.4 Real-Time Processing -- 12.2.3.5 User and Data Privacy -- 12.3 Vehicular Cloud Networking (VCN) -- 12.3.1 Vehicular-Based Cloud Networking (VCN) Architecture -- 12.3.2 Vehicular-Based Cloud Networking (VCN) Operation -- 12.4 Threats in Vehicular-Based Cloud Networking -- 12.4.1 Threats to Tier-1 and Tier-2 Clouds -- 12.4.1.1 Vehicle -- 12.4.1.2 Adjacent Infrastructure -- 12.4.1.3 Wireless Communication -- 12.4.1.4 Messages -- 12.4.1.5 Vehicular Cloud -- 12.4.1.6 Infrastructure Cloud -- 12.4.2 Threats to Tier-3 Cloud -- 12.4.2.1 Data Breaches -- 12.4.2.2 Data Loss -- 12.4.2.3 Account or Service Hijacking -- 12.4.2.4 Denial of Service -- 12.4.2.5 Insecure Interfaces and APIs -- 12.4.2.6 Malicious Insider -- 12.4.2.7 Abuse of Cloud Services -- 12.4.2.8 Shared Technology Vulnerabilities -- 12.5 Review Questions -- References -- Index. |
Record Nr. | UNINA-9910298966203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Guide to Security in SDN and NFV : Challenges, Opportunities, and Applications / / edited by Shao Ying Zhu, Sandra Scott-Hayward, Ludovic Jacquin, Richard Hill |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXII, 331 p. 78 illus.) |
Disciplina | 004.6 |
Collana | Computer Communications and Networks |
Soggetto topico |
Computer communication systems
Computer security Data encryption (Computer science) Computer Communication Networks Systems and Data Security Cryptology |
ISBN | 3-319-64653-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I: Introduction to Security in SDNFV – Key Concepts -- Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies -- NFV Security: Emerging Technologies and Standards -- SDN and NFV Security: Challenges for Integrated Solutions -- Trust in SDN/NFV Environments -- Part II: SDNFV Security Challenges and Network Security Solutions -- Practical Experience in NFV Security Field: Virtual Home Gateway -- A Security Policy Transition Framework for Software-Defined Networks -- SDNFV-Based DDoS Detection and Remediation in Multi-Tenant, Virtualized Infrastructures -- SHIELD – Securing Against Intruders and Other Threats Through a NFV-Enabled Environment -- Part III: Security Implications of SDNFV in Future Networks -- Addressing Industry 4.0 Security by Software-Defined Networking -- Security Requirements for Multi-Operator Virtualized Network and Service Orchestration for 5G -- Improving Security in Coalition Tactical Environments Using an SDN Approach -- A SDN and NFV Use-Case: NDN Implementation and Security Monitoring. |
Record Nr. | UNINA-9910254829803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Guide to Vulnerability Analysis for Computer Networks and Systems : An Artificial Intelligence Approach / / edited by Simon Parkinson, Andrew Crampton, Richard Hill |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (381 pages) |
Disciplina | 005.8 |
Collana | Computer Communications and Networks |
Soggetto topico |
Computer communication systems
Computer security Computer software—Reusability Computers Cognitive psychology |
ISBN | 3-319-92624-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I: Introduction and State of the Art -- Review of the State of the Art of Vulnerability Assessment Using Artificial Intelligence -- A Survey of Machine Learning Algorithms and Their Application in Information Security -- Part II: Vulnerability Assessment Frameworks -- Vulnerability Assessment of Cybersecurity for SCADA Systems -- A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection -- AI and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection -- Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications -- Part III: Applications of Artificial Intelligence -- Automated Planning of Administrative Tasks Using Historic Events: a File System Case Study -- Defending Against Chained Cyber-Attacks by Adversarial Agents -- Vulnerability Detection and Analysis in Adversarial Deep Learning -- SOCIO-LENS: Spotting Unsolicited Callers Through Network Analysis -- Function Call Graphs Versus Machine Learning for Malware Detection -- Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models -- Masquerade Detection on Mobile Devices -- Identifying File Interaction Patterns in Ransomware Behaviour -- Part IV: Visualisation -- A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN -- Big Data and Cyber Security: A Visual Analytics Perspective. |
Record Nr. | UNINA-9910299313403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Polices d’Empires : XVIIIe-XIXe siècles / / Catherine Denys, Vincent Denis |
Autore | Bicalho Maria Fernanda |
Pubbl/distr/stampa | Rennes, : Presses universitaires de Rennes, 2019 |
Descrizione fisica | 1 online resource (196 p.) |
Altri autori (Persone) |
BlanchardEmmanuel
BloembergenMarieke DenisVincent DenysCatherine DoyleMark FysonDonald GaleanoDiego GiulianiErin HillRichard KlinkersEllen PetrowStefan SpencerScott C |
Soggetto topico |
History
Political Science Public Admin. & Development police colonie empire surveillance forces de l'ordre identification |
Soggetto non controllato |
forces de l'ordre
police colonie identification empire surveillance |
ISBN | 2-7535-6897-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Record Nr. | UNINA-9910330712603321 |
Bicalho Maria Fernanda | ||
Rennes, : Presses universitaires de Rennes, 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|