Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (268 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Machine Learning Computer Engineering and Networks Computer Communication Networks Legal Aspects of Computing Medicina legal Xifratge (Informàtica) Seguretat informàtica Programari d'aplicació Cibercultura |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-88381-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism. 4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS. Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References. |
Record Nr. | UNINA-9910502594403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (268 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Machine Learning Computer Engineering and Networks Computer Communication Networks Legal Aspects of Computing Medicina legal Xifratge (Informàtica) Seguretat informàtica Programari d'aplicació Cibercultura |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-88381-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism. 4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS. Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References. |
Record Nr. | UNISA-996464525303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Big Data in Context : Legal, Social and Technological Insights / / edited by Thomas Hoeren, Barbara Kolany-Raiser |
Autore | Hoeren Thomas |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 120 p.) |
Disciplina | 343.099 |
Collana | SpringerBriefs in Law |
Soggetto topico |
Information technology - Law and legislation
Mass media - Law and legislation Quantitative research Data mining Law - Europe Computers - Law and legislation IT Law, Media Law, Intellectual Property Data Analysis and Big Data Data Mining and Knowledge Discovery European Law Legal Aspects of Computing |
ISBN | 3-319-62461-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Thomas Hoeren, Big Data and Data Quality -- Christian Döpke, The Importance of Big Data for Jurisprudence and Legal Practice -- Nicolai Culik and Christian Döpke, About Forgetting and Being Forgotten -- Nicolai Culik, Brussels Calling: Big Data and Privacy -- Andreas Börding, Safe Harbor: The Decision of the European Court of Justice -- Tim Jülicher, Education 2.0: Learning Analytics, Educational Data Mining and Co. -- Max v. Schönfeld, Big Data and Automotive – A Legal Approach -- Stefanie Eschholz and Jonathan Djabbarpour, Big Data and Scoring in the Financial Sector -- Charlotte Röttgen, Like or Dislike – Web Tracking -- Tim Jülicher and Marc Delisle, Step into “The Circle” – A Close Look at Wearables and Quantified Self -- Max v. Schönfeld and Nils Wehkamp, Big Data and Smart Grid -- Max v. Schönfeld, Reinhard Heil and Laura Bittner, Big Data on a Farm – Smart Farming. |
Record Nr. | UNINA-9910231244803321 |
Hoeren Thomas | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Constructive Side-Channel Analysis and Secure Design [[electronic resource] ] : 15th International Workshop, COSADE 2024, Gardanne, France, April 9–10, 2024, Proceedings / / by Romain Wacquez ; edited by Naofumi Homma |
Autore | Homma Naofumi |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (285 pages) |
Disciplina | 005.8 |
Altri autori (Persone) | WacquezRomain |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Computers - Law and legislation Information technology - Law and legislation Computer networks Computers, Special purpose Computer systems Microprogramming Data and Information Security Legal Aspects of Computing Computer Communication Networks Special Purpose and Application-Based Systems Computer System Implementation Control Structures and Microprogramming |
ISBN | 3-031-57543-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Analyses and Tools -- Characterizing and Modeling Synchronous Clock-Glitch Fault Injection -- On-chip evaluation of voltage drops and fault occurrence induced by Si backside EM injection -- EFFLUX-F2: A high performance hardware security evaluation board -- Attack Methods -- Practical Improvements to Statistical Ineffective Fault Attacks -- CAPABARA: A Combined Attack on CAPA -- Deep-Learning-Based Side-Channel Attacks -- Exploring Multi-Task Learning in the Context of Masked AES Implementations -- The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression -- Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption -- PUF/RNG -- Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF -- Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators -- Lightweight Leakage-Resilient PRNG from TBCs using Superposition -- Cryptographic Implementations -- The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+ -- HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme -- Combining Loop Shuffling and Code Polymorphism for Enhanced AES Side-Channel Security. |
Record Nr. | UNINA-9910847598403321 |
Homma Naofumi | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Infrastructure Protection XVII [[electronic resource] ] : 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (X, 253 p. 84 illus., 7 illus. in color.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Computer Engineering and Networks Legal Aspects of Computing |
ISBN | 3-031-49585-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Themes and Issues -- Redefining Homeland Security -- Smart Grid Risks and Impacts -- Smart-Grid-Enabled Business Cases and the Consequences of Cyber Attacks -- Consequence Verification During Risk Assessments of Smart Grids -- Measuring the Impacts of Power Outages on Internet Hosts in the United States -- Network and Telecommunications Systems Security -- Analyzing Discrepancies in Whole-Network Provenance -- A Contextual Integrity Property to Impede Privacy Violations in 5G Networks -- Infrastructure Security -- Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures -- Security-Enhanced Orchestration Platform for Building Management Systems -- Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments -- Automobile Security -- A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures -- Real-Time Attack Detection in Modern Automobile Controller Area Networks. |
Record Nr. | UNINA-9910799493803321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
A Critical Mind [[electronic resource] ] : Hanns Ullrich’s Footprint in Internal Market Law, Antitrust and Intellectual Property / / edited by Christine Godt, Matthias Lamping |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (790 pages) |
Disciplina | 343.0721 |
Collana | MPI Studies on Intellectual Property and Competition Law |
Soggetto topico |
Information technology - Law and legislation
Mass media - Law and legislation IT Law, Media Law, Intellectual Property |
ISBN | 3-662-65974-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I: European Legal Order -- Market Access and Competition Rules of the EU – Was their Constitutionalization Based on a Judicial Error? -- Renewing the Van Gend Pledge – Continuity and Resilience in the Court’s Construction and Defense of the Supranational Character of EU Law -- Why is the Regulation of Enforcement through the EU so Difficult? -- Part II: Competition -- On the Political Nature of Competition Law -- Competition Law and Political Influence of Large Corporations – How Antitrust Analysis Can Capture the Link between Political and Economic Institutions That Affect Market Competition -- Cutting into Diamonds: Competition Law, IPR, Trade Secrets and the Case of ‘Big Data’ -- FRAND Declarations and the ‘Third-Party Effect’ – A Contract Law and Competition Law Perspective -- In Rem Effect of Licensing Declarations – Hanns Ullrich’s Traces in Recent Case Law -- Part III: Intellectual Property -- Mapping the Intangible Economy -- Exclusive Rights for a Purpose – Intellectual Property as a Framework Regulation of Innovation Markets -- From a Rights-Based to a Procedural Approach: Re-Purposing the Exercise of Intellectual Property Rights -- How to Stay Modern Feudalism? Comparing EU and US Methodologies in Containing Post-Sale Restraints by Way of IP Exhaustion -- Virtual Patent Networks and Their Network Effects -- The Public Interest in Compulsory Licensing: Examining the Complementarity Between IP and Competition Law -- Part IV: Data Economy -- Digital Sovereignty and Governance in the Data Economy: Data Trusteeship instead of Property Rights on Data -- Incentives for Data-Sharing as a Case on (Regulating) Knowledge Externalities -- Some Remarks on the Subjective Profiles of the EOSC Project, Especially from the Perspective of IP Law -- Part V: Artificial Intelligence -- Inventorship in the Age of Artificial Intelligence -- Artificial Intelligence and the Technicality Requirement of Patent Law -- Patent Infringement by Development and Use of Artificial Intelligence Systems, Specifically Artificial Neural Networks -- Part VI: Digital Media -- Copyright, News, and ‘Information Products’ under the New DSM Copyright Directive -- Media, Legal Tech and Modern Copyright Law German Lawyers in the Digital World -- Media Policy and Copyright in Europe: The Progressive Expansion of the Law for Broadcasters to Online Platforms -- Part VII: Biotechnology -- Gene Editing Technology Patents or Monopolization of Scientific Knowledge and Health Care? -- A Comprehensive Approach to Plant Variety Rights and Patents in the Field of Innovative Plants -- Part VIII: Global Market Order -- TRIPS through a Military Looking Glass -- A Transactional Approach to Intellectual Property -- Manufacturing for Export: A TRIPS-Consistent Pro-Competitive Exception -- Reductionist Intellectual Property Protection and Expansionist (and ‘Prodevelopment’) Competition Rules as a Human Rights Imperative? Enhancing Technology Transfer to the Global South -- Caught Between Post- and Neo-Colonialism – IP for Traditional Knowledge, Traditional Cultural Expressions and Indigenous Resources. |
Record Nr. | UNINA-9910734847403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybercrimes and Financial Crimes in the Global Era [[electronic resource] /] / edited by Yanping Liu, Minghai Tian, Yanming Shao |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (334 pages) |
Disciplina | 345.0268 |
Soggetto topico |
Private international law
Conflict of laws International law Comparative law Information technology - Law and legislation Mass media - Law and legislation Criminal law Private International Law, International and Foreign Law, Comparative Law IT Law, Media Law, Intellectual Property Criminal Law and Criminal Procedure Law |
ISBN | 981-19-3189-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | An Analysis of the Reasons for the Rise of Financial Crimes and the Decline of Violent Crimes -- Main Challenges Facing to the China's Criminal Legislation on Punishing Financial Crimes -- Criminal Regulations of China's Cybercrime and Its International Cooperation -- Main Trends in the Development of International Crime in the Implementation of Cybertechnologies -- Compliance Against Computer Crimes -- Risks of Cyberspace to Fundamental Rights in the Global Era -- Combating Criminal Computer at Council of Europe -- Digital Technology as a Source of Criminal Risks. |
Record Nr. | UNINA-9910586635903321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu |
Autore | Skarmeta Antonio |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (182 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
CanaveseDaniele
LioyAntonio MatheuSara |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Computers - Law and legislation Information technology - Law and legislation Computer crimes Software engineering Operating systems (Computers) Data and Information Security Legal Aspects of Computing Computer Crime Software Engineering Operating Systems |
ISBN | 3-031-36096-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | S oftware Security -- Network Security and Privacy -- Cybersecurity and Society. |
Record Nr. | UNINA-9910731481503321 |
Skarmeta Antonio | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu |
Autore | Skarmeta Antonio |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (182 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
CanaveseDaniele
LioyAntonio MatheuSara |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Computers - Law and legislation Information technology - Law and legislation Computer crimes Software engineering Operating systems (Computers) Data and Information Security Legal Aspects of Computing Computer Crime Software Engineering Operating Systems |
ISBN | 3-031-36096-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | S oftware Security -- Network Security and Privacy -- Cybersecurity and Society. |
Record Nr. | UNISA-996546821203316 |
Skarmeta Antonio | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
The Emergence of Personal Data Protection as a Fundamental Right of the EU [[electronic resource] /] / by Gloria González Fuster |
Autore | González Fuster Gloria |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (284 p.) |
Disciplina | 342.240858 |
Collana | Issues in Privacy and Data Protection |
Soggetto topico |
Information technology - Law and legislation
Mass media - Law and legislation Computers - Law and legislation Law - Europe Constitutional law Human rights Private international law Conflict of laws International law Comparative law IT Law, Media Law, Intellectual Property Legal Aspects of Computing European Law Constitutional Law Human Rights Private International Law, International and Foreign Law, Comparative Law |
ISBN | 3-319-05023-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Dedication -- Acknowledgements -- Abbreviations -- Table of contents -- Chapter 1: Introduction -- Part A -- Chapter 2: Privacy and the Protection of Personal Data Avant la Lettre -- Chapter 3: The Surfacing of National Norms on Data Processing in Europe -- Chapter 4: The Materialisation of Data Protection in International Instruments -- Part B -- Chapter 5: The Beginning of EU Data Protection -- Chapter 6: EU Fundamental Rights and Personal Data Protection -- Chapter 7: The Right to the Protection of Personal Data and EU law -- Chapter 8: Conclusions. |
Record Nr. | UNINA-9910483028403321 |
González Fuster Gloria | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|