The 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Service : proceedings : Lam Woo International Conference Centre, Hong Kong Baptist University, Hong Kong, China, March 29-April 1, 2005 |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2005 |
Disciplina | 658.8/72 |
Soggetto topico |
Electronic commerce - Technological innovations
Electronic commerce - Computer networks Electronic commerce - Security measures Business intelligence - Computer network resources Business enterprises - Data processing Web services Internet Commerce Marketing & Sales Business & Economics |
ISBN | 1-5386-0158-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996202255803316 |
[Place of publication not identified], : IEEE Computer Society, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
The 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Service : proceedings : Lam Woo International Conference Centre, Hong Kong Baptist University, Hong Kong, China, March 29-April 1, 2005 |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2005 |
Disciplina | 658.8/72 |
Soggetto topico |
Electronic commerce - Technological innovations
Electronic commerce - Computer networks Electronic commerce - Security measures Business intelligence - Computer network resources Business enterprises - Data processing Web services Internet Commerce Marketing & Sales Business & Economics |
ISBN | 1-5386-0158-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910146503803321 |
[Place of publication not identified], : IEEE Computer Society, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
2008 International MCETECH Conference on e-Technologies : 23-25 January, 2008, Montreal, Quebec, Canada : proceedings |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2007 |
Disciplina | 658.8/72 |
Soggetto topico |
Electronic commerce - Technological innovations
Electronic commerce - Computer networks Electronic commerce - Security measures Business intelligence - Computer network resources Business enterprises - Data processing Web services Internet Commerce Marketing & Sales Business & Economics |
ISBN | 1-5090-7913-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996215966403316 |
[Place of publication not identified], : IEEE Computer Society, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
2008 International MCETECH Conference on e-Technologies : 23-25 January, 2008, Montreal, Quebec, Canada : proceedings |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2007 |
Disciplina | 658.8/72 |
Soggetto topico |
Electronic commerce - Technological innovations
Electronic commerce - Computer networks Electronic commerce - Security measures Business intelligence - Computer network resources Business enterprises - Data processing Web services Internet Commerce Marketing & Sales Business & Economics |
ISBN | 1-5090-7913-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145147403321 |
[Place of publication not identified], : IEEE Computer Society, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Automating open source intelligence : algorithms for OSINT / / edited by Robert Layton, Paul A. Watters |
Pubbl/distr/stampa | Amsterdam : , : Elsevier, , [2016] |
Descrizione fisica | 1 online resource (212 pages) : illustrations, charts |
Collana | Syngress advanced topics in information security |
Soggetto topico |
Open source intelligence
Information technology - Social aspects Business intelligence - Computer network resources Intelligence service - Computer network resources Data mining Internet searching Computational intelligence |
ISBN | 0-12-802917-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Chapter 1 - The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 - Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 - Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization
Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 - Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC Comparison to Existing ApproachConclusion and future work; References; Chapter 5 - Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 - Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 - Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 - Ethical Considerations When Using Online Datasets for Research Purposes; Introduction Existing Guidelines |
Record Nr. | UNINA-9910797822003321 |
Amsterdam : , : Elsevier, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Automating open source intelligence : algorithms for OSINT / / edited by Robert Layton, Paul A. Watters |
Pubbl/distr/stampa | Amsterdam : , : Elsevier, , [2016] |
Descrizione fisica | 1 online resource (212 pages) : illustrations, charts |
Collana | Syngress advanced topics in information security |
Soggetto topico |
Open source intelligence
Information technology - Social aspects Business intelligence - Computer network resources Intelligence service - Computer network resources Data mining Internet searching Computational intelligence |
ISBN | 0-12-802917-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Chapter 1 - The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 - Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 - Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization
Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 - Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC Comparison to Existing ApproachConclusion and future work; References; Chapter 5 - Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 - Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 - Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 - Ethical Considerations When Using Online Datasets for Research Purposes; Introduction Existing Guidelines |
Record Nr. | UNINA-9910817908603321 |
Amsterdam : , : Elsevier, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ECBI 2009 : 2009 International Conference on Electronic Commerce and Business Intelligence : proceedings, 6-7 June 2009, Beijing, China |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2009 |
Soggetto topico |
Electronic commerce - Technological innovations
Electronic commerce - Computer networks Business intelligence - Computer network resources Commerce Business & Economics Marketing & Sales |
ISBN | 1-5090-7252-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996218366303316 |
[Place of publication not identified], : IEEE Computer Society, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
ECBI 2009 : 2009 International Conference on Electronic Commerce and Business Intelligence : proceedings, 6-7 June 2009, Beijing, China |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2009 |
Soggetto topico |
Electronic commerce - Technological innovations
Electronic commerce - Computer networks Business intelligence - Computer network resources Commerce Business & Economics Marketing & Sales |
ISBN | 1-5090-7252-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910139856003321 |
[Place of publication not identified], : IEEE Computer Society, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|