top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Digital Forensics XV : 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XV : 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVIII, 272 p. 1 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer crimes
Computers - Law and legislation
Information technology - Law and legislation
Robotics
Computer vision
Data and Information Security
Computer Crime
Legal Aspects of Computing
Computer Vision
ISBN 3-030-28752-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910349290003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XVI : 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6–8, 2020, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XVI : 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6–8, 2020, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 308 p. 48 illus.)
Disciplina 004
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers - Law and legislation
Information technology - Law and legislation
Computer crimes
Application software
Artificial intelligence
Data and Information Security
Legal Aspects of Computing
Computer Crime
Computer and Information Systems Applications
Artificial Intelligence
ISBN 3-030-56223-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910427687903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense [[electronic resource] ] : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense [[electronic resource] ] : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (VII, 263 p. 120 illus., 45 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer crimes
Computer organization
Computers
Mathematical statistics
Computer Crime
Computer Systems Organization and Communication Networks
Computing Milieux
Information Systems and Communication Service
Probability and Statistics in Computer Science
ISBN 3-030-30719-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Overview of Control and Game Theory in Adaptive Cyber-Defenses -- Control Theoretic Approaches to Cyber-Security -- Game-Theoretic Approaches to Cyber-Security: Issues and Challenges and Results -- Reinforcement Learning for Adaptive Cyber Defense against Zero-day Attacks -- Moving Target Defense Quantification -- Empirical Game-Theoretic Methods for Adaptive Cyber-Defense -- MTD Techniques for Memory Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation -- Optimizing Alert Data Management Processes at a Cyber Security Operations Center -- Online and Scalable Adaptive Cyber Defense.
Record Nr. UNISA-996466448203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (VII, 263 p. 120 illus., 45 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer crimes
Computer engineering
Computer networks
Computers
Computer science - Mathematics
Mathematical statistics
Computer Crime
Computer Engineering and Networks
Computing Milieux
Computer Communication Networks
Probability and Statistics in Computer Science
ISBN 3-030-30719-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Overview of Control and Game Theory in Adaptive Cyber-Defenses -- Control Theoretic Approaches to Cyber-Security -- Game-Theoretic Approaches to Cyber-Security: Issues and Challenges and Results -- Reinforcement Learning for Adaptive Cyber Defense against Zero-day Attacks -- Moving Target Defense Quantification -- Empirical Game-Theoretic Methods for Adaptive Cyber-Defense -- MTD Techniques for Memory Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation -- Optimizing Alert Data Management Processes at a Cyber Security Operations Center -- Online and Scalable Adaptive Cyber Defense.
Record Nr. UNINA-9910349301503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Adversarial Multimedia Forensics / / edited by Ehsan Nowroozi, Kassem Kallas, Alireza Jolfaei
Adversarial Multimedia Forensics / / edited by Ehsan Nowroozi, Kassem Kallas, Alireza Jolfaei
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (298 pages)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Machine learning
Image processing - Digital techniques
Computer vision
Computer crimes
Signal processing
Artificial intelligence
Machine Learning
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Crime
Signal, Speech and Image Processing
Artificial Intelligence
ISBN 3-031-49803-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Model Poisoning Attack against Federated Learning with Adaptive Aggregation -- Chapter. 2. Image Forgery Detection using Comprint: A Comprehensive Study -- Chapter. 3. Good or evil: Generative adversarial networks in digital forensics -- Chapter. 4. Refined GAN-Based Attack Against Image Splicing Detection and Localization Algorithms -- Chapter. 5. Generative Adversarial networks for Artificial Satellite Image Creation and Manipulation -- Chapter. 6. Domain Specific Information based learning for Facial Image Forensics -- Chapter. 7. Linguistic Steganography and Linguistic Steganalysis -- Chapter. 8. Random Deep Feature Selection’s Efficiency in Securing Image Manipulation Detectors Opposed by Adversarial Attacks -- Chapter. 9. Optimized Distribution for Robust Watermarking of Deep neural Networks through Fixed Embedding Weights -- Chapter. 10. Anti Forensic Measures and Their Impact on Forensic Investigations -- Chapter. 11. Using Vocoder Artifacts for Audio Deepfakes Detection.
Record Nr. UNINA-9910842298403321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AI Embedded Assurance for Cyber Systems / / edited by Cliff Wang, S.S. Iyengar, Kun Sun
AI Embedded Assurance for Cyber Systems / / edited by Cliff Wang, S.S. Iyengar, Kun Sun
Autore Wang Cliff
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (252 pages)
Disciplina 006.3
Altri autori (Persone) IyengarS. S
SunKun
Soggetto topico Computational intelligence
Computer networks - Security measures
Artificial intelligence
Computer crimes
Cooperating objects (Computer systems)
Computational Intelligence
Mobile and Network Security
Artificial Intelligence
Computer Crime
Cybercrime
Cyber-Physical Systems
ISBN 9783031426377
3031426371
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part. I. AI/ML for Digital Forensics -- Chapter. 1. Writer-dependent Off-line Signature Verification with Neural Networks -- Chapter. 2. Political Activism and Technology -- Chapter. 3. Forensic Proof and Criminal Liability for Development, Distribution and Use of Artificial Intelligence -- Part. II. AI/ML for CPS -- Chapter. 4. Automotive Batteries as Anomaly Detectors -- Chapter. 5. Zero Trust Architecture For Cyber-Physical Power System Security Based on Machine Learning -- Chapter. 6. AI-enabled Real-time Sensor Attack Detection for Cyber-physical Systems -- Part. III. AI/ML for Cyber Analysis -- Chapter. 7. Generating Vulnerable Code via Learning-Based Program Transformation -- Chapter. 8. Security and Privacy Problems in Self-Supervised Learning -- Chapter. 9. Federated Learning for IoT Applications, Attacks and Defense Methods -- Chapter. 10. AI Powered Correlation Technique to Detect VirtualMachine Attacks in Private Cloud Environment -- Chapter. 11. Detecting Fake Users in Online Social Networks -- Chapter. 12. Explaining Deep Learning based Security Applications -- Glossary -- Index.
Record Nr. UNINA-9910770267403321
Wang Cliff  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Art of Cyber Warfare : Strategic and Tactical Approaches for Attack and Defense in the Digital Age / / by Peter Kestner
The Art of Cyber Warfare : Strategic and Tactical Approaches for Attack and Defense in the Digital Age / / by Peter Kestner
Autore Kestner Peter
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (300 pages)
Disciplina 005.8
Collana Computer Science Series
Soggetto topico Data protection
Computer crimes
Computer security
Data and Information Security
Computer Crime
Principles and Models of Security
ISBN 3-658-43879-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: 1984 and the lessons of the past -- Lessons from the past -- Modern and hybrid warfare -- The art of cyber warfare -- Outlook: The future of cyber warfare.
Record Nr. UNINA-9910855367803321
Kestner Peter  
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Business of Hacking : Creating, Developing, and Maintaining an Effective Penetration Testing Team / / by Michael Butler, Jacob G. Oakley
The Business of Hacking : Creating, Developing, and Maintaining an Effective Penetration Testing Team / / by Michael Butler, Jacob G. Oakley
Autore Butler Michael
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Descrizione fisica 1 online resource (311 pages)
Disciplina 005.8
Altri autori (Persone) OakleyJacob G
Soggetto topico Data protection
Computer crimes
Risk management
Data protection - Law and legislation
Data and Information Security
Computer Crime
Security Services
IT Risk Management
Privacy
ISBN 9798868801747
9798868801730
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction. -Chapter 2: The Capability -- Chapter 3: Finding and Retaining Talent -- Chapter 4: Team Management -- Chapter 5: Operational Management -- Chapter 6: Developing Hackers -- Chapter 7: Understanding Clients -- Chapter 8: Engagement Management and Security -- Chapter 9: Effective Web and Mobile Application Testing -- Chapter 10: Effective Testing in Cloud Environments -- Chapter 11: Effective Network Testing -- Chapter 12: Reporting -- Chapter 13: The Wedge -- Chapter 14: The Cyber Arms Dealer -- Chapter 15: New Frontiers -- Chapter 16: Infinite Cost Benefit.
Record Nr. UNINA-9910865246803321
Butler Michael  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers / / edited by Suresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers / / edited by Suresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 123 p. 13 illus., 1 illus. in color.)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Artificial intelligence
Computer networks - Security measures
Computer crimes
Data and Information Security
Artificial Intelligence
Mobile and Network Security
Computer Crime
ISBN 981-15-9700-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computational Intelligence -- Cyber Security -- Computational Models.
Record Nr. UNINA-9910427702603321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 279 p. 270 illus., 65 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer organization
Computer crimes
Law and legislation
Data encryption (Computer science)
Systems and Data Security
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Computer Crime
Legal Aspects of Computing
Cryptology
ISBN 3-030-42051-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information & Operational Technology (IT & OT) security systems (IOSec 2019) -- Model-driven Simulation and Training Environments (MSTEC 2019) -- Security for Financial Critical Infrastructures and Services (FINSEC 2019).
Record Nr. UNISA-996418207003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui