Advance Metadata Fair : The Retention and Disclosure of 4G, 5G and Social Media Location Information, for Law Enforcement and National Security, and the Impact on Privacy in Australia / / by Stanley Shanapinda
| Advance Metadata Fair : The Retention and Disclosure of 4G, 5G and Social Media Location Information, for Law Enforcement and National Security, and the Impact on Privacy in Australia / / by Stanley Shanapinda |
| Autore | Shanapinda Stanley |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (231 pages) |
| Disciplina | 910.285 |
| Collana | Law, Governance and Technology Series |
| Soggetto topico |
Information technology—Law and legislation
Mass media—Law and legislation Computers—Law and legislation Data protection—Law and legislation IT Law, Media Law, Intellectual Property Legal Aspects of Computing Privacy |
| ISBN | 3-030-50255-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | The Dual Nature of Privacy – As a Target and as a Treasure to Protect: An Introduction -- The Legal Framework to Retain Location Information -- The Legal Framework to Collect and Disclose Location Information -- The Legal Framework to Retain and Disclose the Contents of a Communication -- The Powers of the Agencies to Collect and Use Location Information -- Location Information as Personal Information -- Limits to the Powers of the AFP and ASIO to Collect and Use Location Information -- External Oversight Exercised Over the Powers of the Agencies -- The IP-Mediated LTE Network versus the Law -- Proposing the Judicial Location Information Warrant. |
| Record Nr. | UNINA-9910416138603321 |
Shanapinda Stanley
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Autonomous Intelligent Cyber Defense Agent (AICA) [[electronic resource] ] : A Comprehensive Guide / / edited by Alexander Kott
| Autonomous Intelligent Cyber Defense Agent (AICA) [[electronic resource] ] : A Comprehensive Guide / / edited by Alexander Kott |
| Autore | Kott Alexander |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (468 pages) |
| Disciplina | 355.45 |
| Collana | Advances in Information Security |
| Soggetto topico |
Artificial intelligence
Computer networks—Security measures Data protection—Law and legislation Artificial Intelligence Mobile and Network Security Privacy |
| Soggetto non controllato |
Military Art And Science
Technology & Engineering |
| ISBN | 3-031-29269-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents. |
| Record Nr. | UNISA-996546821903316 |
Kott Alexander
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Blockchain and Trustworthy Systems [[electronic resource] ] : Second International Conference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised Selected Papers / / edited by Zibin Zheng, Hong-Ning Dai, Xiaodong Fu, Benhui Chen
| Blockchain and Trustworthy Systems [[electronic resource] ] : Second International Conference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised Selected Papers / / edited by Zibin Zheng, Hong-Ning Dai, Xiaodong Fu, Benhui Chen |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XV, 693 p. 301 illus., 198 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection—Law and legislation
Data protection Computer engineering Computer networks Software engineering Artificial intelligence Privacy Data and Information Security Computer Engineering and Networks Software Engineering Artificial Intelligence |
| ISBN | 981-15-9213-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Theories and Algorithms for Blockchain -- Performance Optimization of Blockchain -- Blockchain Security and Privacy -- Blockchain and Cloud Computing -- Blockchain and Internet of Things -- Blockchain and Mobile Edge Computing -- Blockchain and Smart Contracts -- Blockchain and Data Mining -- Blockchain Services and Applications -- Trustworthy System Development. |
| Record Nr. | UNISA-996465465203316 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Blockchain and Trustworthy Systems : Second International Conference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised Selected Papers / / edited by Zibin Zheng, Hong-Ning Dai, Xiaodong Fu, Benhui Chen
| Blockchain and Trustworthy Systems : Second International Conference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised Selected Papers / / edited by Zibin Zheng, Hong-Ning Dai, Xiaodong Fu, Benhui Chen |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XV, 693 p. 301 illus., 198 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection—Law and legislation
Data protection Computer engineering Computer networks Software engineering Artificial intelligence Privacy Data and Information Security Computer Engineering and Networks Software Engineering Artificial Intelligence |
| ISBN | 981-15-9213-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Theories and Algorithms for Blockchain -- Performance Optimization of Blockchain -- Blockchain Security and Privacy -- Blockchain and Cloud Computing -- Blockchain and Internet of Things -- Blockchain and Mobile Edge Computing -- Blockchain and Smart Contracts -- Blockchain and Data Mining -- Blockchain Services and Applications -- Trustworthy System Development. |
| Record Nr. | UNINA-9910427699203321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blocks and Chains [[electronic resource] ] : Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms / / by Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl
| Blocks and Chains [[electronic resource] ] : Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms / / by Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl |
| Autore | Judmayer Aljosha |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XIII, 109 p.) |
| Disciplina | 005.8 |
| Collana | Synthesis Lectures on Information Security, Privacy, and Trust |
| Soggetto topico |
Blockchains (Databases)
Data protection Data protection—Law and legislation Cryptography Data encryption (Computer science) Blockchain Data and Information Security Privacy Cryptology |
| ISBN | 3-031-02352-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Acknowledgments -- Introduction -- Background -- History of Cryptographic Currencies -- Bitcoin -- Coin Management Tools -- Nakamoto Consensus -- Conclusion and Open Challenges -- Bibliography -- Authors' Biographies. |
| Record Nr. | UNINA-9910795641603321 |
Judmayer Aljosha
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blocks and Chains : Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms / / by Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl
| Blocks and Chains : Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms / / by Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl |
| Autore | Judmayer Aljosha |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XIII, 109 p.) |
| Disciplina | 005.8 |
| Collana | Synthesis Lectures on Information Security, Privacy, and Trust |
| Soggetto topico |
Blockchains (Databases)
Data protection Data protection—Law and legislation Cryptography Data encryption (Computer science) Blockchain Data and Information Security Privacy Cryptology |
| ISBN |
9783031023521
3031023528 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Acknowledgments -- Introduction -- Background -- History of Cryptographic Currencies -- Bitcoin -- Coin Management Tools -- Nakamoto Consensus -- Conclusion and Open Challenges -- Bibliography -- Authors' Biographies. |
| Record Nr. | UNINA-9910974077103321 |
Judmayer Aljosha
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Classical and Modern Cryptography for Beginners [[electronic resource] /] / by Rajkumar Banoth, Rekha Regar
| Classical and Modern Cryptography for Beginners [[electronic resource] /] / by Rajkumar Banoth, Rekha Regar |
| Autore | Banoth Rajkumar |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (230 pages) |
| Disciplina | 005.824 |
| Altri autori (Persone) | RegarRekha |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Data protection—Law and legislation Computer networks—Security measures Data protection Cryptology Privacy Mobile and Network Security Data and Information Security |
| ISBN | 3-031-32959-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: An Introduction to Classical And Modern Cryptography -- Chapter 2: Security Standards for Classical and Modern Cryptography -- Chapter-3: Mathematical Foundation for Classical and Modern Cryptography -- Chapter 4: Asymmetric Key Cryptography -- Chapter-5: Modern Cryptanalysis Methods, Advanced Network Attacks and Cloud Security. |
| Record Nr. | UNISA-996546825903316 |
Banoth Rajkumar
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cognitive Security [[electronic resource] ] : A System-Scientific Approach / / by Linan Huang, Quanyan Zhu
| Cognitive Security [[electronic resource] ] : A System-Scientific Approach / / by Linan Huang, Quanyan Zhu |
| Autore | Huang Linan |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (117 pages) |
| Disciplina | 004.019 |
| Altri autori (Persone) | ZhuQuanyan |
| Collana | SpringerBriefs in Computer Science |
| Soggetto topico |
Data protection—Law and legislation
Artificial intelligence Privacy Artificial Intelligence |
| Soggetto non controllato | Mathematics |
| ISBN | 3-031-30709-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter. 1. Introduction -- Chapter. 2. System-Scientific Methods -- Chapter. 3. Cognitive Capacities for Designing, Operating, Supervising, and Securing Complex Systems -- Chapter. 4. Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities -- Chapter. 5. ADVERT: Defending against Reactive Attention Attacks -- Chapter. 6. RADAMS: Defending against Proactive Attention Attacks -- Chapter. 7. Summary and Conclusions. |
| Record Nr. | UNISA-996546831203316 |
Huang Linan
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity / / edited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra
| Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity / / edited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (viii, 450 pages) : illustrations |
| Disciplina | 005.8 |
| Collana | Advanced Sciences and Technologies for Security Applications |
| Soggetto topico |
Artificial intelligence
Big data Data protection—Law and legislation Security systems Artificial Intelligence Big Data Privacy Security Science and Technology |
| ISBN | 3-030-35746-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Foreword -- Part 1: Cyber Defence & Critical National Infrastructure (CNI) -- Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age -- The Malicious Use of AI-based Deepfake technology as the New Threat to Psychological Security and Political Stability -- Considerations for the Governance of AI and Government Legislative Frameworks -- Part 2: Augmented Humanity & Digital Society -- Augmented humanity: Data, Privacy and Security -- Consumer Awareness on Security and Privacy Threat of Medical Devices -- Biohacking Capabilities & Threat/ Attack Vectors -- Digital Twins for Precision Healthcare -- 5G Cybersecurity Vulnerabilities with IoT and Smart Societies -- Part 3: Technology of Cyber Attacks -- Blockchain, TTP Attacks and Harmonious Relationship with AI -- Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks -- Experimental Analyses in Search of Effective Mitigation for Login Cross-Site Request Forgery -- Attack Vectors and Advanced Persistent Threats -- Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks -- Part 4: Smart Societies and Data Exploitation -- Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management -- Combating Domestic Abuse inflicted in smart societies -- Deep Convolutional Neural Networks for Forensic Age Estimation: a Review -- Secure Implementation of E-governance: a Case Study about Estonia -- Insider Threat. |
| Record Nr. | UNINA-9910409675203321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data Protection in a Post-Pandemic Society [[electronic resource] ] : Laws, Regulations, Best Practices and Recent Solutions / / edited by Chaminda Hewage, Yogachandran Rahulamathavan, Deepthi Ratnayake
| Data Protection in a Post-Pandemic Society [[electronic resource] ] : Laws, Regulations, Best Practices and Recent Solutions / / edited by Chaminda Hewage, Yogachandran Rahulamathavan, Deepthi Ratnayake |
| Autore | Hewage Chaminda |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (246 pages) |
| Disciplina |
005.8
323.448 |
| Altri autori (Persone) |
RahulamathavanYogachandran
RatnayakeDeepthi |
| Soggetto topico |
Data protection—Law and legislation
Data protection Financial risk management Privacy Data and Information Security Risk Management |
| ISBN | 3-031-34006-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter. 1. Post-Covid-19 Metaverse Cybersecurity and Data Privacy-Present and Future Challenges -- Chapter. 2. Keeping it Low-Key: Modern-day approaches to Privacy-Preserving Machine Learning -- Chapter. 3. Security Analysis of Android Hot Cryptocurrency Wallet Applications -- Chapter. 4. Exploring the Opportunities of Applying Digital Twins for Intrusion Detection in Industrial Control Systems of Production and Manufacturing – A Systematic Review -- Chapter. 5. Securing Privacy During a World Health Emergency: Exploring How to Create a Balance Between the Need to Save the World and People’s Right to Privacy -- Chapter. 6. Federated Learning: Data privacy and cyber security in edge-based machine learning Mobile Malware Detection Using Consortium -- Chapter. 7. Emerging Computer Security Laws and Regulations across the Globe: A Comparison between Sri Lankan and Contemporary International Computer Acts -- Chapter. 8. Legal Considerations and Ethical Challenges of Artificial Intelligence on Internet of Things and Smart Cities. |
| Record Nr. | UNISA-996546841303316 |
Hewage Chaminda
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||