top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (268 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Communication Networks
Legal Aspects of Computing
Medicina legal
Xifratge (Informàtica)
Seguretat informàtica
Programari d'aplicació
Cibercultura
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-88381-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism.
4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS.
Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References.
Record Nr. UNINA-9910502594403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (268 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Communication Networks
Legal Aspects of Computing
Medicina legal
Xifratge (Informàtica)
Seguretat informàtica
Programari d'aplicació
Cibercultura
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-88381-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism.
4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS.
Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References.
Record Nr. UNISA-996464525303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Big Data in Context : Legal, Social and Technological Insights / / edited by Thomas Hoeren, Barbara Kolany-Raiser
Big Data in Context : Legal, Social and Technological Insights / / edited by Thomas Hoeren, Barbara Kolany-Raiser
Autore Hoeren Thomas
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 120 p.)
Disciplina 343.099
Collana SpringerBriefs in Law
Soggetto topico Information technology - Law and legislation
Mass media - Law and legislation
Quantitative research
Data mining
Law - Europe
Computers - Law and legislation
IT Law, Media Law, Intellectual Property
Data Analysis and Big Data
Data Mining and Knowledge Discovery
European Law
Legal Aspects of Computing
ISBN 3-319-62461-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Thomas Hoeren, Big Data and Data Quality -- Christian Döpke, The Importance of Big Data for Jurisprudence and Legal Practice -- Nicolai Culik and Christian Döpke, About Forgetting and Being Forgotten -- Nicolai Culik, Brussels Calling: Big Data and Privacy -- Andreas Börding, Safe Harbor: The Decision of the European Court of Justice -- Tim Jülicher, Education 2.0: Learning Analytics, Educational Data Mining and Co. -- Max v. Schönfeld, Big Data and Automotive – A Legal Approach -- Stefanie Eschholz and Jonathan Djabbarpour, Big Data and Scoring in the Financial Sector -- Charlotte Röttgen, Like or Dislike – Web Tracking -- Tim Jülicher and Marc Delisle, Step into “The Circle” – A Close Look at Wearables and Quantified Self -- Max v. Schönfeld and Nils Wehkamp, Big Data and Smart Grid -- Max v. Schönfeld, Reinhard Heil and Laura Bittner, Big Data on a Farm – Smart Farming.
Record Nr. UNINA-9910231244803321
Hoeren Thomas  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Constructive Side-Channel Analysis and Secure Design [[electronic resource] ] : 15th International Workshop, COSADE 2024, Gardanne, France, April 9–10, 2024, Proceedings / / by Romain Wacquez ; edited by Naofumi Homma
Constructive Side-Channel Analysis and Secure Design [[electronic resource] ] : 15th International Workshop, COSADE 2024, Gardanne, France, April 9–10, 2024, Proceedings / / by Romain Wacquez ; edited by Naofumi Homma
Autore Homma Naofumi
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (285 pages)
Disciplina 005.8
Altri autori (Persone) WacquezRomain
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computers - Law and legislation
Information technology - Law and legislation
Computer networks
Computers, Special purpose
Computer systems
Microprogramming
Data and Information Security
Legal Aspects of Computing
Computer Communication Networks
Special Purpose and Application-Based Systems
Computer System Implementation
Control Structures and Microprogramming
ISBN 3-031-57543-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analyses and Tools -- Characterizing and Modeling Synchronous Clock-Glitch Fault Injection -- On-chip evaluation of voltage drops and fault occurrence induced by Si backside EM injection -- EFFLUX-F2: A high performance hardware security evaluation board -- Attack Methods -- Practical Improvements to Statistical Ineffective Fault Attacks -- CAPABARA: A Combined Attack on CAPA -- Deep-Learning-Based Side-Channel Attacks -- Exploring Multi-Task Learning in the Context of Masked AES Implementations -- The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression -- Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption -- PUF/RNG -- Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF -- Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators -- Lightweight Leakage-Resilient PRNG from TBCs using Superposition -- Cryptographic Implementations -- The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+ -- HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme -- Combining Loop Shuffling and Code Polymorphism for Enhanced AES Side-Channel Security.
Record Nr. UNINA-9910847598403321
Homma Naofumi  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XVII [[electronic resource] ] : 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XVII [[electronic resource] ] : 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (X, 253 p. 84 illus., 7 illus. in color.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Computer Engineering and Networks
Legal Aspects of Computing
ISBN 3-031-49585-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Themes and Issues -- Redefining Homeland Security -- Smart Grid Risks and Impacts -- Smart-Grid-Enabled Business Cases and the Consequences of Cyber Attacks -- Consequence Verification During Risk Assessments of Smart Grids -- Measuring the Impacts of Power Outages on Internet Hosts in the United States -- Network and Telecommunications Systems Security -- Analyzing Discrepancies in Whole-Network Provenance -- A Contextual Integrity Property to Impede Privacy Violations in 5G Networks -- Infrastructure Security -- Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures -- Security-Enhanced Orchestration Platform for Building Management Systems -- Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments -- Automobile Security -- A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures -- Real-Time Attack Detection in Modern Automobile Controller Area Networks.
Record Nr. UNINA-9910799493803321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
A Critical Mind [[electronic resource] ] : Hanns Ullrich’s Footprint in Internal Market Law, Antitrust and Intellectual Property / / edited by Christine Godt, Matthias Lamping
A Critical Mind [[electronic resource] ] : Hanns Ullrich’s Footprint in Internal Market Law, Antitrust and Intellectual Property / / edited by Christine Godt, Matthias Lamping
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (790 pages)
Disciplina 343.0721
Collana MPI Studies on Intellectual Property and Competition Law
Soggetto topico Information technology - Law and legislation
Mass media - Law and legislation
IT Law, Media Law, Intellectual Property
ISBN 3-662-65974-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: European Legal Order -- Market Access and Competition Rules of the EU – Was their Constitutionalization Based on a Judicial Error? -- Renewing the Van Gend Pledge – Continuity and Resilience in the Court’s Construction and Defense of the Supranational Character of EU Law -- Why is the Regulation of Enforcement through the EU so Difficult? -- Part II: Competition -- On the Political Nature of Competition Law -- Competition Law and Political Influence of Large Corporations – How Antitrust Analysis Can Capture the Link between Political and Economic Institutions That Affect Market Competition -- Cutting into Diamonds: Competition Law, IPR, Trade Secrets and the Case of ‘Big Data’ -- FRAND Declarations and the ‘Third-Party Effect’ – A Contract Law and Competition Law Perspective -- In Rem Effect of Licensing Declarations – Hanns Ullrich’s Traces in Recent Case Law -- Part III: Intellectual Property -- Mapping the Intangible Economy -- Exclusive Rights for a Purpose – Intellectual Property as a Framework Regulation of Innovation Markets -- From a Rights-Based to a Procedural Approach: Re-Purposing the Exercise of Intellectual Property Rights -- How to Stay Modern Feudalism? Comparing EU and US Methodologies in Containing Post-Sale Restraints by Way of IP Exhaustion -- Virtual Patent Networks and Their Network Effects -- The Public Interest in Compulsory Licensing: Examining the Complementarity Between IP and Competition Law -- Part IV: Data Economy -- Digital Sovereignty and Governance in the Data Economy: Data Trusteeship instead of Property Rights on Data -- Incentives for Data-Sharing as a Case on (Regulating) Knowledge Externalities -- Some Remarks on the Subjective Profiles of the EOSC Project, Especially from the Perspective of IP Law -- Part V: Artificial Intelligence -- Inventorship in the Age of Artificial Intelligence -- Artificial Intelligence and the Technicality Requirement of Patent Law -- Patent Infringement by Development and Use of Artificial Intelligence Systems, Specifically Artificial Neural Networks -- Part VI: Digital Media -- Copyright, News, and ‘Information Products’ under the New DSM Copyright Directive -- Media, Legal Tech and Modern Copyright Law German Lawyers in the Digital World -- Media Policy and Copyright in Europe: The Progressive Expansion of the Law for Broadcasters to Online Platforms -- Part VII: Biotechnology -- Gene Editing Technology Patents or Monopolization of Scientific Knowledge and Health Care? -- A Comprehensive Approach to Plant Variety Rights and Patents in the Field of Innovative Plants -- Part VIII: Global Market Order -- TRIPS through a Military Looking Glass -- A Transactional Approach to Intellectual Property -- Manufacturing for Export: A TRIPS-Consistent Pro-Competitive Exception -- Reductionist Intellectual Property Protection and Expansionist (and ‘Prodevelopment’) Competition Rules as a Human Rights Imperative? Enhancing Technology Transfer to the Global South -- Caught Between Post- and Neo-Colonialism – IP for Traditional Knowledge, Traditional Cultural Expressions and Indigenous Resources.
Record Nr. UNINA-9910734847403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybercrimes and Financial Crimes in the Global Era [[electronic resource] /] / edited by Yanping Liu, Minghai Tian, Yanming Shao
Cybercrimes and Financial Crimes in the Global Era [[electronic resource] /] / edited by Yanping Liu, Minghai Tian, Yanming Shao
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (334 pages)
Disciplina 345.0268
Soggetto topico Private international law
Conflict of laws
International law
Comparative law
Information technology - Law and legislation
Mass media - Law and legislation
Criminal law
Private International Law, International and Foreign Law, Comparative Law
IT Law, Media Law, Intellectual Property
Criminal Law and Criminal Procedure Law
ISBN 981-19-3189-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Analysis of the Reasons for the Rise of Financial Crimes and the Decline of Violent Crimes -- Main Challenges Facing to the China's Criminal Legislation on Punishing Financial Crimes -- Criminal Regulations of China's Cybercrime and Its International Cooperation -- Main Trends in the Development of International Crime in the Implementation of Cybertechnologies -- Compliance Against Computer Crimes -- Risks of Cyberspace to Fundamental Rights in the Global Era -- Combating Criminal Computer at Council of Europe -- Digital Technology as a Source of Criminal Risks.
Record Nr. UNINA-9910586635903321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu
Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu
Autore Skarmeta Antonio
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (182 pages)
Disciplina 005.8
Altri autori (Persone) CanaveseDaniele
LioyAntonio
MatheuSara
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computers - Law and legislation
Information technology - Law and legislation
Computer crimes
Software engineering
Operating systems (Computers)
Data and Information Security
Legal Aspects of Computing
Computer Crime
Software Engineering
Operating Systems
ISBN 3-031-36096-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto S oftware Security -- Network Security and Privacy -- Cybersecurity and Society.
Record Nr. UNINA-9910731481503321
Skarmeta Antonio  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu
Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu
Autore Skarmeta Antonio
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (182 pages)
Disciplina 005.8
Altri autori (Persone) CanaveseDaniele
LioyAntonio
MatheuSara
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computers - Law and legislation
Information technology - Law and legislation
Computer crimes
Software engineering
Operating systems (Computers)
Data and Information Security
Legal Aspects of Computing
Computer Crime
Software Engineering
Operating Systems
ISBN 3-031-36096-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto S oftware Security -- Network Security and Privacy -- Cybersecurity and Society.
Record Nr. UNISA-996546821203316
Skarmeta Antonio  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The Emergence of Personal Data Protection as a Fundamental Right of the EU [[electronic resource] /] / by Gloria González Fuster
The Emergence of Personal Data Protection as a Fundamental Right of the EU [[electronic resource] /] / by Gloria González Fuster
Autore González Fuster Gloria
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (284 p.)
Disciplina 342.240858
Collana Issues in Privacy and Data Protection
Soggetto topico Information technology - Law and legislation
Mass media - Law and legislation
Computers - Law and legislation
Law - Europe
Constitutional law
Human rights
Private international law
Conflict of laws
International law
Comparative law
IT Law, Media Law, Intellectual Property
Legal Aspects of Computing
European Law
Constitutional Law
Human Rights
Private International Law, International and Foreign Law, Comparative Law
ISBN 3-319-05023-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Dedication -- Acknowledgements -- Abbreviations -- Table of contents -- Chapter 1: Introduction -- Part A -- Chapter 2: Privacy and the Protection of Personal Data Avant la Lettre -- Chapter 3: The Surfacing of National Norms on Data Processing in Europe -- Chapter 4: The Materialisation of Data Protection in International Instruments -- Part B -- Chapter 5: The Beginning of EU Data Protection -- Chapter 6: EU Fundamental Rights and Personal Data Protection -- Chapter 7: The Right to the Protection of Personal Data and EU law -- Chapter 8: Conclusions.
Record Nr. UNINA-9910483028403321
González Fuster Gloria  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...