top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
ASONAM 2021 : proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : ASONAM '21, November 8-11, 2021, Virtual Event, Netherlands / / editors: Michele Coscia, Alfredo Cuzzocrea, Kai Shu ; committee: Reda Alhajj [and 28 others]
ASONAM 2021 : proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : ASONAM '21, November 8-11, 2021, Virtual Event, Netherlands / / editors: Michele Coscia, Alfredo Cuzzocrea, Kai Shu ; committee: Reda Alhajj [and 28 others]
Pubbl/distr/stampa New York : , : Association for Computing Machinery, , 2021
Descrizione fisica 1 online resource : illustrations
Disciplina 794.8
Soggetto topico Big data
Bioinformatics
Data mining
Medical informatics
Online social networks
Open source intelligence
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
IEEE/ACM ASONAM 2021
ASONAM '21
2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
International Conference on Advances in Social Networks Analysis and Mining
Record Nr. UNINA-9910548283503321
New York : , : Association for Computing Machinery, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Automating open source intelligence : algorithms for OSINT / / edited by Robert Layton, Paul A. Watters
Automating open source intelligence : algorithms for OSINT / / edited by Robert Layton, Paul A. Watters
Pubbl/distr/stampa Amsterdam : , : Elsevier, , [2016]
Descrizione fisica 1 online resource (212 pages) : illustrations, charts
Collana Syngress advanced topics in information security
Soggetto topico Open source intelligence
Information technology - Social aspects
Business intelligence - Computer network resources
Intelligence service - Computer network resources
Data mining
Internet searching
Computational intelligence
ISBN 0-12-802917-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 - The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 - Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 - Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization
Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 - Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC
Comparison to Existing ApproachConclusion and future work; References; Chapter 5 - Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 - Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report
Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 - Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques
Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 - Ethical Considerations When Using Online Datasets for Research Purposes; Introduction
Existing Guidelines
Record Nr. UNINA-9910797822003321
Amsterdam : , : Elsevier, , [2016]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Automating open source intelligence : algorithms for OSINT / / edited by Robert Layton, Paul A. Watters
Automating open source intelligence : algorithms for OSINT / / edited by Robert Layton, Paul A. Watters
Pubbl/distr/stampa Amsterdam : , : Elsevier, , [2016]
Descrizione fisica 1 online resource (212 pages) : illustrations, charts
Collana Syngress advanced topics in information security
Soggetto topico Open source intelligence
Information technology - Social aspects
Business intelligence - Computer network resources
Intelligence service - Computer network resources
Data mining
Internet searching
Computational intelligence
ISBN 0-12-802917-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 - The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 - Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 - Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization
Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 - Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC
Comparison to Existing ApproachConclusion and future work; References; Chapter 5 - Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 - Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report
Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 - Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques
Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 - Ethical Considerations When Using Online Datasets for Research Purposes; Introduction
Existing Guidelines
Record Nr. UNINA-9910817908603321
Amsterdam : , : Elsevier, , [2016]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Copy, rip, burn [[electronic resource] ] : the politics of copyleft and open source / / David M. Berry
Copy, rip, burn [[electronic resource] ] : the politics of copyleft and open source / / David M. Berry
Autore Berry David M (David Michael)
Pubbl/distr/stampa London, : Pluto Press, 2008
Descrizione fisica 1 online resource (280 p.)
Disciplina 303.482
005.3
Soggetto topico Intercultural communication
Mass media and culture
Open source intelligence
Soggetto genere / forma Electronic books.
ISBN 1-84964-455-1
1-282-00595-2
9786612005954
1-4356-9068-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910454699603321
Berry David M (David Michael)  
London, : Pluto Press, 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Copy, rip, burn [[electronic resource] ] : the politics of copyleft and open source / / David M. Berry
Copy, rip, burn [[electronic resource] ] : the politics of copyleft and open source / / David M. Berry
Autore Berry David M (David Michael)
Pubbl/distr/stampa London, : Pluto Press, 2008
Descrizione fisica 1 online resource (280 p.)
Disciplina 303.482
005.3
Soggetto topico Intercultural communication
Mass media and culture
Open source intelligence
ISBN 1-84964-455-1
1-282-00595-2
9786612005954
1-4356-9068-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910782655703321
Berry David M (David Michael)  
London, : Pluto Press, 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques / / Sudhanshu Chauhan, Nutan Kumar Panda
Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques / / Sudhanshu Chauhan, Nutan Kumar Panda
Autore Chauhan Sudhanshu
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam, [Netherlands] : , : Syngress, , 2015
Descrizione fisica 1 online resource (301 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
World Wide Web
Open source intelligence
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 - Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 - Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE
HOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3 - Understanding Browsers and Beyond; INTRODUCTION; BROWSER OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY BROWSERS; Chapter 4 - Search the Web-Beyond Convention; INTRODUCTION; Chapter 5 - Advanced Web Searching; INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6 - OSINT Tools and Techniques; INTRODUCTION; CREEPY
THEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; Chapter 7 - Metadata; INTRODUCTION; METADATA EXTRACTION TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8 - Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9 - Deepweb: Exploring the Darkest Corners of the Internet; INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET SERVICES; DISCLAIMER; Chapter 10 - Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11 - Online Security; INTRODUCTION; MALWARES; PHISHING
ONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; DATA ENCRYPTION; Chapter 12 - Basics of Social Networks Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE ATTRIBUTES; Chapter 13 - Quick and Dirty Python; INTRODUCTION; Chapter 14 - Case Studies and Examples; INTRODUCTION; CASE STUDIES; Chapter 15 - Related Topics of Interest; INTRODUCTION; CRYPTOGRAPHY
DATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; Index
Record Nr. UNINA-9910788136303321
Chauhan Sudhanshu  
Amsterdam, [Netherlands] : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques / / Sudhanshu Chauhan, Nutan Kumar Panda
Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques / / Sudhanshu Chauhan, Nutan Kumar Panda
Autore Chauhan Sudhanshu
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam, [Netherlands] : , : Syngress, , 2015
Descrizione fisica 1 online resource (301 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
World Wide Web
Open source intelligence
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 - Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 - Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE
HOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3 - Understanding Browsers and Beyond; INTRODUCTION; BROWSER OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY BROWSERS; Chapter 4 - Search the Web-Beyond Convention; INTRODUCTION; Chapter 5 - Advanced Web Searching; INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6 - OSINT Tools and Techniques; INTRODUCTION; CREEPY
THEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; Chapter 7 - Metadata; INTRODUCTION; METADATA EXTRACTION TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8 - Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9 - Deepweb: Exploring the Darkest Corners of the Internet; INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET SERVICES; DISCLAIMER; Chapter 10 - Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11 - Online Security; INTRODUCTION; MALWARES; PHISHING
ONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; DATA ENCRYPTION; Chapter 12 - Basics of Social Networks Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE ATTRIBUTES; Chapter 13 - Quick and Dirty Python; INTRODUCTION; Chapter 14 - Case Studies and Examples; INTRODUCTION; CASE STUDIES; Chapter 15 - Related Topics of Interest; INTRODUCTION; CRYPTOGRAPHY
DATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; Index
Record Nr. UNINA-9910821806203321
Chauhan Sudhanshu  
Amsterdam, [Netherlands] : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Open source investigations in the age of Google / / editors, Henrietta Wilson, Olamide Samuel, Dan Plesch
Open source investigations in the age of Google / / editors, Henrietta Wilson, Olamide Samuel, Dan Plesch
Disciplina 327.12
Soggetto topico Open source intelligence
Security, International
Human rights monitoring
Internet searching
ISBN 1-80061-407-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910883693503321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Tao of open source intelligence / / Stewart K. Bertram
The Tao of open source intelligence / / Stewart K. Bertram
Autore Bertram Stewart K.
Edizione [1st edition]
Pubbl/distr/stampa Cambridgeshire, England : , : IT Governance Publishing, , 2015
Descrizione fisica 1 online resource (137 pages)
Disciplina 327.1202854678
Soggetto topico Open source intelligence
ISBN 1-84928-730-9
1-84928-729-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: "What Can Open Source Intelligence Do For Me -- The Surface Web -- Deep Web -- The Dark Web -- Internet Security for the Smart Investigator -- Conclusion -- Annex A: Tips for Building a Credible Sock Puppet.
Record Nr. UNINA-9910797338803321
Bertram Stewart K.  
Cambridgeshire, England : , : IT Governance Publishing, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Tao of open source intelligence / / Stewart K. Bertram
The Tao of open source intelligence / / Stewart K. Bertram
Autore Bertram Stewart K.
Edizione [1st edition]
Pubbl/distr/stampa Cambridgeshire, England : , : IT Governance Publishing, , 2015
Descrizione fisica 1 online resource (137 pages)
Disciplina 327.1202854678
Soggetto topico Open source intelligence
ISBN 1-84928-730-9
1-84928-729-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: "What Can Open Source Intelligence Do For Me -- The Surface Web -- Deep Web -- The Dark Web -- Internet Security for the Smart Investigator -- Conclusion -- Annex A: Tips for Building a Credible Sock Puppet.
Record Nr. UNINA-9910816707503321
Bertram Stewart K.  
Cambridgeshire, England : , : IT Governance Publishing, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui