.. Workshop on Socio-technical Aspects in Security and Trust : STAST . |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE, , [2011]- |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures - Social aspects
Computer security - Social aspects Computer crimes - Prevention Computer crimes - Social aspects |
Soggetto genere / forma | Conference papers and proceedings. |
ISSN | 2325-1697 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
STAST ..
Proceedings |
Record Nr. | UNISA-996279389203316 |
Piscataway, NJ : , : IEEE, , [2011]- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
.. Workshop on Socio-technical Aspects in Security and Trust : STAST . |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE, , [2011]- |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures - Social aspects
Computer security - Social aspects Computer crimes - Prevention Computer crimes - Social aspects |
Soggetto genere / forma | Conference papers and proceedings. |
ISSN | 2325-1697 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
STAST ..
Proceedings |
Record Nr. | UNINA-9910626159203321 |
Piscataway, NJ : , : IEEE, , [2011]- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
2009 eCrime Researchers Summit |
Pubbl/distr/stampa | [Place of publication not identified], : I E E E, 2009 |
Descrizione fisica | 1 online resource : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Internet - Security measures Computer crimes - Prevention |
ISBN | 1-4244-4626-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996203021403316 |
[Place of publication not identified], : I E E E, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
2009 eCrime Researchers Summit |
Pubbl/distr/stampa | [Place of publication not identified], : I E E E, 2009 |
Descrizione fisica | 1 online resource : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Internet - Security measures Computer crimes - Prevention |
ISBN | 1-4244-4626-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910138777603321 |
[Place of publication not identified], : I E E E, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
2010 second Cybercrime and Trustworthy Computing Workshop : 19-20 July 2010 |
Pubbl/distr/stampa | New York : , : IEEE, , 2010 |
Descrizione fisica | 1 online resource (88 pages) |
Soggetto topico |
Computer crimes - Prevention
Computer security Internet - Security measures |
ISBN | 0-7695-4186-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996213761403316 |
New York : , : IEEE, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
2010 second Cybercrime and Trustworthy Computing Workshop : 19-20 July 2010 |
Pubbl/distr/stampa | New York : , : IEEE, , 2010 |
Descrizione fisica | 1 online resource (88 pages) |
Soggetto topico |
Computer crimes - Prevention
Computer security Internet - Security measures |
ISBN | 0-7695-4186-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910140938403321 |
New York : , : IEEE, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
8th IET International System Safety Conference incorporating the Cyber Security Conference 2013 : 16-17 October 2013 |
Pubbl/distr/stampa | Stevenage, England : , : IET, , 2014 |
Descrizione fisica | 1 online resource (245 pages) |
Soggetto topico |
Industrial safety
Automatic control - Reliability Computer crimes - Prevention |
ISBN | 1-84919-778-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910135093903321 |
Stevenage, England : , : IET, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
8th IET International System Safety Conference incorporating the Cyber Security Conference 2013 : 16-17 October 2013 |
Pubbl/distr/stampa | Stevenage, England : , : IET, , 2014 |
Descrizione fisica | 1 online resource (245 pages) |
Soggetto topico |
Industrial safety
Automatic control - Reliability Computer crimes - Prevention |
ISBN | 1-84919-778-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996281150003316 |
Stevenage, England : , : IET, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection |
Autore | Mahajan Shilpa |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2024 |
Descrizione fisica | 1 online resource (371 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
KhuranaMehak
EstrelaVania Vieira |
Soggetto topico |
Computer security - Technological innovations
Artificial intelligence Computer networks - Security measures Computer crimes - Prevention |
ISBN |
1-394-19647-4
1-394-19645-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | PART A: Artificial Intelligence (AI) in Cyber Security Analytics: Fundamental and Challenges. Analysis of Malicious executables and detection techniques. Detection and Analysis of Botnet Attacks Using Machine Learning Techniques. Artificial Intelligence Perspective on Digital Forensics. Review on Machine Learning-based Traffic Rules Contravention Detection System. Enhancing Cybersecurity Ratings using Artificial Intelligence and DevOps Technologies -- PART B: Cyber Threat Detection and Analysis Using Artificial Intelligence and Big Data. Malware analysis techniques in Android-based Smartphones Applications. Cyber Threat Detection and Mitigation Using Artificial Intelligence - A Cyber-physical Perspective. Performance Analysis of Intrusion Detection System using ML techniques. Spectral Pattern learning approach-based student sentiment analysis using Dense-net multiperception neural network in E-learning Environment. Big Data and Deep Learning Based Tourism Industry Sentiment Analysis Using Deep Spectral Recurrent Neural Network -- PART C: Applied Artificial Intelligence Approaches in Emerging Cyber Security Domains. Enhancing Security in Cloud Computing using Artificial Intelligence (AI). Utilization of Deep Learning Models for Safe Human-friendly Computing in Cloud, Fog and Mobile Edge Networks. Artificial Intelligence for Threat Anomaly Detection using Graph Databases - A Semantic Outlook. Security in Blockchain-based Smart Applications using Artificial Intelligence (AI). Leveraging Deep Learning Techniques for Securing the Internet of Things in the Age of Big Data Era. |
Record Nr. | UNINA-9910843799703321 |
Mahajan Shilpa | ||
Newark : , : John Wiley & Sons, Incorporated, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
At the nexus of cybersecurity and public policy : some basic concepts and issues / / David Clark, Thomas Berson, and Herbert S. Lin, editors ; Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work, Computer Science and Telecommunications Board, National Research Council of the Academies |
Pubbl/distr/stampa | Washington, District of Columbia : , : The National Academies Press, , 2014 |
Descrizione fisica | 1 online resource (149 p.) |
Disciplina | 005.80973 |
Soggetto topico |
Computer security - United States
Computer networks - Security measures - Government policy Computer crimes - Prevention |
Soggetto genere / forma | Electronic books. |
ISBN | 0-309-30319-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ""Front Matter""; ""Preface""; ""Acknowledgment of Reviewers""; ""Contents""; ""Summary""; ""1 Why Care About Cybersecurity?""; ""2 Some Basics of Computing and Communications Technology and Their Significance for Cybersecurity""; ""3 On the Nature of Cybersecurity""; ""4 Enhancing Cybersecurity""; ""5 Tensions Between Cybersecurity and Other Public Policy Concerns""; ""6 Findings and Conclusion""; ""Appendixes""; ""Appendix A: Committee Members and Staff""; ""Appendix B: Bibliography"" |
Record Nr. | UNINA-9910466564403321 |
Washington, District of Columbia : , : The National Academies Press, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|