Advances in Digital Forensics XV : 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics XV : 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XVIII, 272 p. 1 illus.) |
| Disciplina | 005.8 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Computer crimes Computers - Law and legislation Information technology - Law and legislation Robotics Computer vision Data and Information Security Computer Crime Legal Aspects of Computing Computer Vision |
| ISBN | 3-030-28752-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910349290003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Digital Forensics XVI : 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6–8, 2020, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics XVI : 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6–8, 2020, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XVIII, 308 p. 48 illus.) |
| Disciplina | 004 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Computers - Law and legislation Information technology - Law and legislation Computer crimes Application software Artificial intelligence Data and Information Security Legal Aspects of Computing Computer Crime Computer and Information Systems Applications Artificial Intelligence |
| ISBN | 3-030-56223-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910427687903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense [[electronic resource] ] : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
| Adversarial and Uncertain Reasoning for Adaptive Cyber Defense [[electronic resource] ] : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (VII, 263 p. 120 illus., 45 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer crimes
Computer organization Computers Mathematical statistics Computer Crime Computer Systems Organization and Communication Networks Computing Milieux Information Systems and Communication Service Probability and Statistics in Computer Science |
| ISBN | 3-030-30719-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Overview of Control and Game Theory in Adaptive Cyber-Defenses -- Control Theoretic Approaches to Cyber-Security -- Game-Theoretic Approaches to Cyber-Security: Issues and Challenges and Results -- Reinforcement Learning for Adaptive Cyber Defense against Zero-day Attacks -- Moving Target Defense Quantification -- Empirical Game-Theoretic Methods for Adaptive Cyber-Defense -- MTD Techniques for Memory Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation -- Optimizing Alert Data Management Processes at a Cyber Security Operations Center -- Online and Scalable Adaptive Cyber Defense. |
| Record Nr. | UNISA-996466448203316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
| Adversarial and Uncertain Reasoning for Adaptive Cyber Defense : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (VII, 263 p. 120 illus., 45 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer crimes
Computer engineering Computer networks Computers Computer science - Mathematics Mathematical statistics Computer Crime Computer Engineering and Networks Computing Milieux Computer Communication Networks Probability and Statistics in Computer Science |
| ISBN | 3-030-30719-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Overview of Control and Game Theory in Adaptive Cyber-Defenses -- Control Theoretic Approaches to Cyber-Security -- Game-Theoretic Approaches to Cyber-Security: Issues and Challenges and Results -- Reinforcement Learning for Adaptive Cyber Defense against Zero-day Attacks -- Moving Target Defense Quantification -- Empirical Game-Theoretic Methods for Adaptive Cyber-Defense -- MTD Techniques for Memory Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation -- Optimizing Alert Data Management Processes at a Cyber Security Operations Center -- Online and Scalable Adaptive Cyber Defense. |
| Record Nr. | UNINA-9910349301503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Adversarial Multimedia Forensics / / edited by Ehsan Nowroozi, Kassem Kallas, Alireza Jolfaei
| Adversarial Multimedia Forensics / / edited by Ehsan Nowroozi, Kassem Kallas, Alireza Jolfaei |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (298 pages) |
| Disciplina | 005.8 |
| Collana | Advances in Information Security |
| Soggetto topico |
Machine learning
Image processing - Digital techniques Computer vision Computer crimes Signal processing Artificial intelligence Machine Learning Computer Imaging, Vision, Pattern Recognition and Graphics Computer Crime Signal, Speech and Image Processing Artificial Intelligence |
| ISBN | 3-031-49803-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter. 1. Model Poisoning Attack against Federated Learning with Adaptive Aggregation -- Chapter. 2. Image Forgery Detection using Comprint: A Comprehensive Study -- Chapter. 3. Good or evil: Generative adversarial networks in digital forensics -- Chapter. 4. Refined GAN-Based Attack Against Image Splicing Detection and Localization Algorithms -- Chapter. 5. Generative Adversarial networks for Artificial Satellite Image Creation and Manipulation -- Chapter. 6. Domain Specific Information based learning for Facial Image Forensics -- Chapter. 7. Linguistic Steganography and Linguistic Steganalysis -- Chapter. 8. Random Deep Feature Selection’s Efficiency in Securing Image Manipulation Detectors Opposed by Adversarial Attacks -- Chapter. 9. Optimized Distribution for Robust Watermarking of Deep neural Networks through Fixed Embedding Weights -- Chapter. 10. Anti Forensic Measures and Their Impact on Forensic Investigations -- Chapter. 11. Using Vocoder Artifacts for Audio Deepfakes Detection. |
| Record Nr. | UNINA-9910842298403321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
AI Embedded Assurance for Cyber Systems / / edited by Cliff Wang, S.S. Iyengar, Kun Sun
| AI Embedded Assurance for Cyber Systems / / edited by Cliff Wang, S.S. Iyengar, Kun Sun |
| Autore | Wang Cliff |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (252 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
IyengarS. S
SunKun |
| Soggetto topico |
Computational intelligence
Computer networks - Security measures Artificial intelligence Computer crimes Cooperating objects (Computer systems) Computational Intelligence Mobile and Network Security Artificial Intelligence Computer Crime Cybercrime Cyber-Physical Systems |
| ISBN |
9783031426377
3031426371 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Part. I. AI/ML for Digital Forensics -- Chapter. 1. Writer-dependent Off-line Signature Verification with Neural Networks -- Chapter. 2. Political Activism and Technology -- Chapter. 3. Forensic Proof and Criminal Liability for Development, Distribution and Use of Artificial Intelligence -- Part. II. AI/ML for CPS -- Chapter. 4. Automotive Batteries as Anomaly Detectors -- Chapter. 5. Zero Trust Architecture For Cyber-Physical Power System Security Based on Machine Learning -- Chapter. 6. AI-enabled Real-time Sensor Attack Detection for Cyber-physical Systems -- Part. III. AI/ML for Cyber Analysis -- Chapter. 7. Generating Vulnerable Code via Learning-Based Program Transformation -- Chapter. 8. Security and Privacy Problems in Self-Supervised Learning -- Chapter. 9. Federated Learning for IoT Applications, Attacks and Defense Methods -- Chapter. 10. AI Powered Correlation Technique to Detect VirtualMachine Attacks in Private Cloud Environment -- Chapter. 11. Detecting Fake Users in Online Social Networks -- Chapter. 12. Explaining Deep Learning based Security Applications -- Glossary -- Index. |
| Record Nr. | UNINA-9910770267403321 |
Wang Cliff
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Art of Cyber Warfare : Strategic and Tactical Approaches for Attack and Defense in the Digital Age / / by Peter Kestner
| The Art of Cyber Warfare : Strategic and Tactical Approaches for Attack and Defense in the Digital Age / / by Peter Kestner |
| Autore | Kestner Peter |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (300 pages) |
| Disciplina | 005.8 |
| Collana | Computer Science Series |
| Soggetto topico |
Data protection
Computer crimes Computer security Data and Information Security Computer Crime Principles and Models of Security |
| ISBN | 3-658-43879-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction: 1984 and the lessons of the past -- Lessons from the past -- Modern and hybrid warfare -- The art of cyber warfare -- Outlook: The future of cyber warfare. |
| Record Nr. | UNINA-9910855367803321 |
Kestner Peter
|
||
| Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Business of Hacking : Creating, Developing, and Maintaining an Effective Penetration Testing Team / / by Michael Butler, Jacob G. Oakley
| The Business of Hacking : Creating, Developing, and Maintaining an Effective Penetration Testing Team / / by Michael Butler, Jacob G. Oakley |
| Autore | Butler Michael |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024 |
| Descrizione fisica | 1 online resource (311 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) | OakleyJacob G |
| Soggetto topico |
Data protection
Computer crimes Risk management Data protection - Law and legislation Data and Information Security Computer Crime Security Services IT Risk Management Privacy |
| ISBN |
9798868801747
9798868801730 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: Introduction. -Chapter 2: The Capability -- Chapter 3: Finding and Retaining Talent -- Chapter 4: Team Management -- Chapter 5: Operational Management -- Chapter 6: Developing Hackers -- Chapter 7: Understanding Clients -- Chapter 8: Engagement Management and Security -- Chapter 9: Effective Web and Mobile Application Testing -- Chapter 10: Effective Testing in Cloud Environments -- Chapter 11: Effective Network Testing -- Chapter 12: Reporting -- Chapter 13: The Wedge -- Chapter 14: The Cyber Arms Dealer -- Chapter 15: New Frontiers -- Chapter 16: Infinite Cost Benefit. |
| Record Nr. | UNINA-9910865246803321 |
Butler Michael
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers / / edited by Suresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar
| Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers / / edited by Suresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (X, 123 p. 13 illus., 1 illus. in color.) |
| Disciplina | 006.3 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection
Artificial intelligence Computer networks - Security measures Computer crimes Data and Information Security Artificial Intelligence Mobile and Network Security Computer Crime |
| ISBN | 981-15-9700-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Computational Intelligence -- Cyber Security -- Computational Models. |
| Record Nr. | UNINA-9910427702603321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro
| Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XVIII, 279 p. 270 illus., 65 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computers Computer organization Computer crimes Law and legislation Data encryption (Computer science) Systems and Data Security Information Systems and Communication Service Computer Systems Organization and Communication Networks Computer Crime Legal Aspects of Computing Cryptology |
| ISBN | 3-030-42051-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Information & Operational Technology (IT & OT) security systems (IOSec 2019) -- Model-driven Simulation and Training Environments (MSTEC 2019) -- Security for Financial Critical Infrastructures and Services (FINSEC 2019). |
| Record Nr. | UNISA-996418207003316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||