Diffusion in social networks / / by Paulo Shakarian, Abhivav Bhatnagar, Ashkan Aleali, Elham Shaabani, Ruocheng Guo
| Diffusion in social networks / / by Paulo Shakarian, Abhivav Bhatnagar, Ashkan Aleali, Elham Shaabani, Ruocheng Guo |
| Autore | Shakarian Paulo |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , [2015] |
| Descrizione fisica | 1 online resource (110 p.) |
| Disciplina | 519.233 |
| Collana | SpringerBriefs in Computer Science |
| Soggetto topico |
Intel·ligència artificial
Xifratge (Informàtica) Xarxes socials en línia Artificial intelligence Data encryption (Computer science) Artificial Intelligence Cryptology |
| ISBN | 3-319-23105-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- The SIR Model and Identification of Spreaders -- The Tipping Model and the Minimum Seed Problem -- The Independent Cascade and Linear Threshold Models -- Logic Programming Based Diffusion Models -- Evolutionary Graph Theory -- Examining Diffusion in the Real World -- Conclusion. |
| Record Nr. | UNINA-9910299202103321 |
Shakarian Paulo
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
| Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia |
| Autore | Shakarian Paulo |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 |
| Descrizione fisica | 1 online resource (256 p.) |
| Disciplina | 355.4 |
| Altri autori (Persone) |
ShakarianJana
RuefAndrew |
| Soggetto topico |
Information warfare
Cyberterrorism Cyberspace - Security measures Computer crimes Data protection |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-12-407926-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology Arab Spring |
| Record Nr. | UNISA-996426339703316 |
Shakarian Paulo
|
||
| Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
| Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia |
| Autore | Shakarian Paulo |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 |
| Descrizione fisica | 1 online resource (256 p.) |
| Disciplina | 355.4 |
| Altri autori (Persone) |
ShakarianJana
RuefAndrew |
| Soggetto topico |
Information warfare
Cyberterrorism Cyberspace - Security measures Computer crimes Data protection |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-12-407926-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology Arab Spring |
| Record Nr. | UNINA-9910459153503321 |
Shakarian Paulo
|
||
| Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Introduction to cyber-warfare : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
| Introduction to cyber-warfare : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia |
| Autore | Shakarian Paulo |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 |
| Descrizione fisica | 1 online resource (xvii, 318 pages) : illustrations (some color), map |
| Disciplina | 355.4 |
| Collana | Gale eBooks |
| Soggetto topico |
Information warfare
Cyberterrorism Cyberspace - Security measures Computer crimes Data protection |
| Soggetto non controllato | information assurance - attribution |
| ISBN | 0-12-407926-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology Arab Spring |
| Record Nr. | UNINA-9910792484503321 |
Shakarian Paulo
|
||
| Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Introduction to cyber-warfare : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
| Introduction to cyber-warfare : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia |
| Autore | Shakarian Paulo |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 |
| Descrizione fisica | 1 online resource (xvii, 318 pages) : illustrations (some color), map |
| Disciplina | 355.4 |
| Collana | Gale eBooks |
| Soggetto topico |
Information warfare
Cyberterrorism Cyberspace - Security measures Computer crimes Data protection |
| Soggetto non controllato | information assurance - attribution |
| ISBN | 0-12-407926-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology Arab Spring |
| Record Nr. | UNINA-9910822035903321 |
Shakarian Paulo
|
||
| Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Neuro symbolic reasoning and learning / / Paulo Shakarian, Chitta Baral, Gerardo I. Simari, Bowen Xi, Lahari Pokala
| Neuro symbolic reasoning and learning / / Paulo Shakarian, Chitta Baral, Gerardo I. Simari, Bowen Xi, Lahari Pokala |
| Autore | Shakarian Paulo |
| Pubbl/distr/stampa | Cham : , : Springer, , [2023] |
| Descrizione fisica | 1 online resource (xii, 119 pages) : illustrations |
| Disciplina | 006.31 |
| Collana | SpringerBriefs in computer science |
| Soggetto topico |
Artificial intelligence
Machine learning Logic, Symbolic and mathematical Artificial Intelligence Machine Learning |
| ISBN | 3-031-39179-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. New Ideas in Neuro Symbolic Reasoning and Learning -- Chapter 2. Brief Introduction to Propositional Logic and Predicate Calculus -- Chapter 3. Fuzzy and Annotated Logic for Neuro Symbolic Artificial Intelligence -- Chapter 4. LTN: Logic Tensor Networks -- Chapter 5. Neuro Symbolic Reasoning with Ontological Networks -- Chapter 6. LNN: Logical Neural Networks -- Chapter 7. NeurASP -- Chapter 8. Neuro Symbolic Learning with Differentiable Inductive Logic Programming -- Chapter 9. Understanding SATNet: Constraint Learning and Symbol Grounding -- Chapter 10. Neuro Symbolic AI for Sequential Decision Making -- Chapter 11. Neuro Symbolic Applications. |
| Record Nr. | UNISA-996550558403316 |
Shakarian Paulo
|
||
| Cham : , : Springer, , [2023] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Neuro Symbolic Reasoning and Learning / / by Paulo Shakarian, Chitta Baral, Gerardo I. Simari, Bowen Xi, Lahari Pokala
| Neuro Symbolic Reasoning and Learning / / by Paulo Shakarian, Chitta Baral, Gerardo I. Simari, Bowen Xi, Lahari Pokala |
| Autore | Shakarian Paulo |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (xii, 119 pages) : illustrations |
| Disciplina | 006.31 |
| Collana | SpringerBriefs in Computer Science |
| Soggetto topico |
Artificial intelligence
Machine learning Artificial Intelligence Machine Learning |
| ISBN |
9783031391798
3031391799 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter1 New Ideas in Neuro Symbolic Reasoning and Learning -- Chapter2 Brief Introduction to Propositional Logic and Predicate Calculus -- Chapter3 Fuzzy and Annotated Logic for Neuro Symbolic Artificial Intelligence -- Chapter4 LTN: Logic Tensor Networks -- Chapter5 Neuro Symbolic Reasoning with Ontological Networks -- Chapter6 LNN: Logical Neural Networks -- Chapter7 NeurASP -- Chapter8 Neuro Symbolic Learning with Differentiable Inductive Logic Programming -- Chapter9 Understanding SATNet: Constraint Learning and Symbol Grounding -- Chapter10 Neuro Symbolic AI for Sequential Decision Making -- Chapter11 Neuro Symbolic Applications. |
| Record Nr. | UNINA-9910744508303321 |
Shakarian Paulo
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||