AI Applications in Cyber Security and Privacy of Communication Networks : Proceedings of 10th International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2024)
| AI Applications in Cyber Security and Privacy of Communication Networks : Proceedings of 10th International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2024) |
| Autore | Hewage Chaminda E. R |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Singapore : , : Springer, , 2025 |
| Descrizione fisica | 1 online resource (182 pages) |
| Altri autori (Persone) |
ZafarMohammad Haseeb
KesswaniNishtha |
| Collana | Lecture Notes in Networks and Systems Series |
| Soggetto topico |
COMPUTERS / Artificial Intelligence / General
COMPUTERS / Security / General TECHNOLOGY & ENGINEERING / Engineering (General) |
| ISBN | 981-9674-00-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911022457603321 |
Hewage Chaminda E. R
|
||
| Singapore : , : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
| Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson |
| Autore | Ward David D (Electronics engineer) |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Warrendale, Pennsylvania : , : SAE International, , 2021 |
| Descrizione fisica | 1 online resource (1 PDF (xii, 93 pages)) : color illustrations |
| Disciplina | 629.2826 |
| Soggetto topico |
Automotive computers - Security measures
Computer security - Standards COMPUTERS / Security / General TECHNOLOGY & ENGINEERING / Automotive TRANSPORTATION / Automotive / General Computer security Automotive technology and trades Road and motor vehicles: general interest |
| ISBN |
1-4686-0083-4
1-4686-0081-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Preface -- About the authors -- Chapter 1: Introduction to automotive cybersecurity -- Chapter 2: Cybersecurity for automotive cyber-physical systems -- Chapter 3: Establishing a cybersecurity process -- Chapter 4: Assurance and certification -- Chaper 5: Conclusions and going further -- References -- Index. |
| Record Nr. | UNINA-9910795798803321 |
Ward David D (Electronics engineer)
|
||
| Warrendale, Pennsylvania : , : SAE International, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
| Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson |
| Autore | Ward David D (Electronics engineer) |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Warrendale, Pennsylvania : , : SAE International, , 2021 |
| Descrizione fisica | 1 online resource (1 PDF (xii, 93 pages)) : color illustrations |
| Disciplina | 629.2826 |
| Soggetto topico |
Automotive computers - Security measures
Computer security - Standards COMPUTERS / Security / General TECHNOLOGY & ENGINEERING / Automotive TRANSPORTATION / Automotive / General Computer security Automotive technology and trades Road and motor vehicles: general interest |
| ISBN |
1-4686-0083-4
1-4686-0081-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Preface -- About the authors -- Chapter 1: Introduction to automotive cybersecurity -- Chapter 2: Cybersecurity for automotive cyber-physical systems -- Chapter 3: Establishing a cybersecurity process -- Chapter 4: Assurance and certification -- Chaper 5: Conclusions and going further -- References -- Index. |
| Record Nr. | UNINA-9910826019903321 |
Ward David D (Electronics engineer)
|
||
| Warrendale, Pennsylvania : , : SAE International, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blockchain - ICBC 2025 : 8th International Conference, Held As Part of the Services Conference Federation, SCF 2025, Hong Kong, China, September 27-30, 2025, Proceedings
| Blockchain - ICBC 2025 : 8th International Conference, Held As Part of the Services Conference Federation, SCF 2025, Hong Kong, China, September 27-30, 2025, Proceedings |
| Autore | Shyamasundar Rudrapatna K |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Cham : , : Springer, , 2025 |
| Descrizione fisica | 1 online resource (366 pages) |
| Altri autori (Persone) |
HuangHuawei
HeSonglin FangJunbin ZhangLiang-Jie |
| Collana | Lecture Notes in Computer Science Series |
| Soggetto topico |
COMPUTERS / Hardware / General
COMPUTERS / Security / General COMPUTERS / Software Development & Engineering / General |
| ISBN | 9783032061768 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996678670503316 |
Shyamasundar Rudrapatna K
|
||
| Cham : , : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Defense in Depth : Modern Cybersecurity Strategies and Evolving Threats
| Defense in Depth : Modern Cybersecurity Strategies and Evolving Threats |
| Autore | Zangana Hewa Majeed |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2025 |
| Descrizione fisica | 1 online resource (299 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
COMPUTERS / Security / General
COMPUTERS / Security / Network Security |
| ISBN |
1-394-34075-3
1-394-34074-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911031579603321 |
Zangana Hewa Majeed
|
||
| Newark : , : John Wiley & Sons, Incorporated, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Digital Earth : Cyber Threats, Privacy and Ethics in an Age of Paranoia
| Digital Earth : Cyber Threats, Privacy and Ethics in an Age of Paranoia |
| Autore | Katz Sarah |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Ely : , : IT Governance Ltd, , 2022 |
| Descrizione fisica | 1 online resource (108 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
LAW / Computer & Internet
COMPUTERS / Security / General LAW / Communications LAW / Criminal Law / General |
| Soggetto non controllato | Mathematics |
| ISBN |
9781787783607
178778360X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cover -- Title -- Copyright -- About the author -- Acknowledgements -- Contents -- Introduction -- Chapter one: The spike in phishing amid the COVID-19 pandemic -- Key terms for this chapter -- Chaos theory in cyber threat mitigation -- The application of chaos theory to the assessment of phishing attacks -- Chapter two: A glance at the history of phishing mitigation practices -- The risk of phishing to federal health care agencies -- Applications of chaos theory in cyber threat mitigation, including phishing attacks -- Machine learning tools for phishing prevention -- Persuasive factors used in phishing attacks -- User awareness of email legitimacy verification techniques -- Chapter three: The hard truth - How little many users understand about identifying malicious emails -- Tackling email headers -- Next steps: Computer- assisted threat detection -- Chapter four: Disinformation versus misinformation in a post-COVID world -- Global information sharing -- Content moderators -- How to spot misinformation -- Managing content moderation: In theory and practice -- Next steps: Head above water in cyberspace -- Chapter five: Cyber terrorism and the firepower of social media -- Why convey a message to the masses? -- Making it look alluring -- Using social media to attract and recruit -- Next steps: Keep an eye on that friend request -- Chapter six: Drones - A search and rescue solution or the all-seeing eye in the sky? -- The technicalities of civilian privacy in UAV criminal investigation -- San Jose as a case study -- Those opposed -- Those in favor -- Calming the public outcry -- Balancing technological surveillance measures with public interest -- Next steps: Securing the wireless target -- Recent developments -- Chapter seven: Tying it all together -- Appendix A: Bibliography -- Further reading. |
| Record Nr. | UNINA-9911009185503321 |
Katz Sarah
|
||
| Ely : , : IT Governance Ltd, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ethical and Social Impacts of Information and Communication Technology : 22nd International Conference, ETHICOMP 2025, Lisbon, Portugal, September 17-19, 2025, Proceedings
| Ethical and Social Impacts of Information and Communication Technology : 22nd International Conference, ETHICOMP 2025, Lisbon, Portugal, September 17-19, 2025, Proceedings |
| Autore | Alvarez Isabel |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Cham : , : Springer, , 2025 |
| Descrizione fisica | 1 online resource (899 pages) |
| Disciplina | 303.4833 |
| Altri autori (Persone) |
Arias-OlivaMario
Horia DediuAdrian SilvaNuno |
| Collana | Lecture Notes in Computer Science Series |
| Soggetto topico |
COMPUTERS / Security / General
SOCIAL SCIENCE / Criminology |
| ISBN | 3-032-01429-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996678677203316 |
Alvarez Isabel
|
||
| Cham : , : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Securing the Digital Frontier : Threats and Advanced Techniques in Security and Forensics
| Securing the Digital Frontier : Threats and Advanced Techniques in Security and Forensics |
| Autore | Sharma Kavita |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2025 |
| Descrizione fisica | 1 online resource (417 pages) |
| Altri autori (Persone) |
SharmaVishnu
NandParma SagarAnil Kumar ShrivastavaGulshan |
| Soggetto topico | COMPUTERS / Security / General |
| ISBN |
9781394268917
1394268912 9781394268894 1394268890 9781394268900 1394268904 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911019604103321 |
Sharma Kavita
|
||
| Newark : , : John Wiley & Sons, Incorporated, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||