2008 eCrime Researchers Summit |
Pubbl/distr/stampa | [Place of publication not identified], : I E E E, 2008 |
Descrizione fisica | 1 online resource |
Disciplina | 364.168 |
Soggetto topico | Computer crimes |
ISBN | 1-5090-8094-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996203037603316 |
[Place of publication not identified], : I E E E, 2008 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2008 eCrime Researchers Summit |
Pubbl/distr/stampa | [Place of publication not identified], : I E E E, 2008 |
Descrizione fisica | 1 online resource |
Disciplina | 364.168 |
Soggetto topico | Computer crimes |
ISBN | 1-5090-8094-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145406503321 |
[Place of publication not identified], : I E E E, 2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2011 eCrime Researchers Summit |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2011 |
Descrizione fisica | 1 online resource (various pagings) : illustrations |
Disciplina | 364.16 |
Soggetto topico |
Computer crimes
Computer networks - Security measures Cyberterrorism |
ISBN |
1-4577-1339-X
1-4577-1338-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996205891803316 |
[Place of publication not identified], : IEEE, 2011 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2011 eCrime Researchers Summit |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2011 |
Descrizione fisica | 1 online resource (various pagings) : illustrations |
Disciplina | 364.16 |
Soggetto topico |
Computer crimes
Computer networks - Security measures Cyberterrorism |
ISBN |
1-4577-1339-X
1-4577-1338-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910139115803321 |
[Place of publication not identified], : IEEE, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2017 Cybersecurity and Cyberforensics Conference (CCC) / / Institute of Electrical and Electronics Engineers (IEEE) Staff |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers (IEEE), , 2017 |
Descrizione fisica | 1 online resource : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computer crimes |
ISBN | 1-5386-2143-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 2017 Cybersecurity and Cyberforensics Conference |
Record Nr. | UNISA-996280894603316 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers (IEEE), , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2017 Cybersecurity and Cyberforensics Conference (CCC) / / Institute of Electrical and Electronics Engineers (IEEE) Staff |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers (IEEE), , 2017 |
Descrizione fisica | 1 online resource : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computer crimes |
ISBN | 1-5386-2143-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 2017 Cybersecurity and Cyberforensics Conference |
Record Nr. | UNINA-9910251445203321 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers (IEEE), , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2018 IEEE International Workshop on Information Forensics and Security : 11-13 Deember 2018, Hong Kong / / IEEE Signal Processing Society |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018 |
Descrizione fisica | 1 online resource (37 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computer crimes Data encryption (Computer science) |
Soggetto genere / forma | Electronic books. |
ISBN | 1-5386-6536-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910309758603321 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2018 IEEE International Workshop on Information Forensics and Security : 11-13 Deember 2018, Hong Kong / / IEEE Signal Processing Society |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018 |
Descrizione fisica | 1 online resource (37 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computer crimes Data encryption (Computer science) |
ISBN | 1-5386-6536-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996575289703316 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
The 2018 Yearbook of the Digital Ethics Lab / / edited by Carl Öhman, David Watson |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (223 pages) : illustrations |
Disciplina |
174.96
175 |
Collana | Digital Ethics Lab Yearbook |
Soggetto topico |
Philosophy
Technology—Sociological aspects Computer security Ethics Computer crimes Philosophy of Technology Science and Technology Studies Privacy Cybercrime |
ISBN | 3-030-17152-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction: Digital Ethics: Goals and Approach (Carl Öhman, David Watson, Mariarosaria Taddeo, Luciano Floridi) -- Chapter 1. Digital Ethics: Its Nature and Scope (Luciano Floridi, Corinne Cath, Mariarosaria Taddeo) -- Chapter 2. Do We Need a Critical Evaluation of the Role of Mathematics in Data Science? (Patrick Allo) -- Chapter 3. Using Data From Git and GitHub in Ethnographies of Software Development (Andrew Turner) -- Chapter 4. The Price of Discovery: A Model of Scientific Research Markets (David Watson) -- Chapter 5. Projecting AI-Crime: A Review of Plausible Threats (Thomas King) -- Chapter 6. The Challenges of Cyber Deterrence (Mariarosaria Taddeo) -- Chapter 7. Internet Governance and Human Rights: A Literature Review (Corinne Cath) -- Chapter 8. Privacy Risks and Responses in the Digital Age (Josh Cowls) -- Chapter 9. Digitalised Legal Information: Towards a New Publication Model (Václav Janeček) -- Chapter 10. From Bones to Bytes: A New Chapter in the History of Death (Carl Öhman) -- Chapter 11. The Green and the Blue — Naïve Ideas to Improve Politics in a Mature Information Society (Luciano FLoridi). |
Record Nr. | UNINA-9910349541003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies / / edited by Ahmed A. Abd El-Latif, Yassine Maleh, Wojciech Mazurczyk, Mohammed ELAffendi, Mohamed I. Alkanhal |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (336 pages) |
Disciplina |
929.605
005.8 |
Collana | Engineering Cyber-Physical Systems and Critical Infrastructures |
Soggetto topico |
Computational intelligence
Engineering - Data processing Computer crimes Computational Intelligence Data Engineering Cybercrime |
ISBN | 3-031-21101-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Malware Detection Using RGB Images and CNN Model Subclassing -- Chapter 2: IoT Trust Management as an SIoT Enabler Overcoming Security Issues -- Chapter 3: Cloud Virtualization Attacks and Mitigation Techniques -- Chapter 4: Android Ransomware Attacks Detection with Optimized Ensemble Learning -- Chapter 5: A Dual Attack Tree Approach to Assist Command and Control Server Analysis of the Red Teaming Activity -- Chapter 6: Intelligent Detection System for Spoofing and Jamming Attacks in UAVs. |
Record Nr. | UNINA-9910682584503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|