ASONAM 2021 : proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : ASONAM '21, November 8-11, 2021, Virtual Event, Netherlands / / editors: Michele Coscia, Alfredo Cuzzocrea, Kai Shu ; committee: Reda Alhajj [and 28 others]
| ASONAM 2021 : proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : ASONAM '21, November 8-11, 2021, Virtual Event, Netherlands / / editors: Michele Coscia, Alfredo Cuzzocrea, Kai Shu ; committee: Reda Alhajj [and 28 others] |
| Pubbl/distr/stampa | New York : , : Association for Computing Machinery, , 2021 |
| Descrizione fisica | 1 online resource : illustrations |
| Disciplina | 794.8 |
| Soggetto topico |
Big data
Bioinformatics Data mining Medical informatics Online social networks Open source intelligence |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining IEEE/ACM ASONAM 2021 ASONAM '21 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) International Conference on Advances in Social Networks Analysis and Mining |
| Record Nr. | UNINA-9910548283503321 |
| New York : , : Association for Computing Machinery, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Automating open source intelligence : algorithms for OSINT / / edited by Robert Layton, Paul A. Watters
| Automating open source intelligence : algorithms for OSINT / / edited by Robert Layton, Paul A. Watters |
| Pubbl/distr/stampa | Amsterdam : , : Elsevier, , [2016] |
| Descrizione fisica | 1 online resource (212 pages) : illustrations, charts |
| Collana | Syngress advanced topics in information security |
| Soggetto topico |
Open source intelligence
Information technology - Social aspects Business intelligence - Computer network resources Intelligence service - Computer network resources Data mining Internet searching Computational intelligence |
| ISBN | 0-12-802917-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Chapter 1 - The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 - Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 - Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization
Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 - Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC Comparison to Existing ApproachConclusion and future work; References; Chapter 5 - Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 - Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 - Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 - Ethical Considerations When Using Online Datasets for Research Purposes; Introduction Existing Guidelines |
| Record Nr. | UNINA-9910797822003321 |
| Amsterdam : , : Elsevier, , [2016] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Automating open source intelligence : algorithms for OSINT / / edited by Robert Layton, Paul A. Watters
| Automating open source intelligence : algorithms for OSINT / / edited by Robert Layton, Paul A. Watters |
| Pubbl/distr/stampa | Amsterdam : , : Elsevier, , [2016] |
| Descrizione fisica | 1 online resource (212 pages) : illustrations, charts |
| Collana | Syngress advanced topics in information security |
| Soggetto topico |
Open source intelligence
Information technology - Social aspects Business intelligence - Computer network resources Intelligence service - Computer network resources Data mining Internet searching Computational intelligence |
| ISBN | 0-12-802917-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Chapter 1 - The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 - Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 - Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization
Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 - Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC Comparison to Existing ApproachConclusion and future work; References; Chapter 5 - Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 - Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 - Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 - Ethical Considerations When Using Online Datasets for Research Purposes; Introduction Existing Guidelines |
| Record Nr. | UNINA-9910817908603321 |
| Amsterdam : , : Elsevier, , [2016] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Copy, rip, burn [[electronic resource] ] : the politics of copyleft and open source / / David M. Berry
| Copy, rip, burn [[electronic resource] ] : the politics of copyleft and open source / / David M. Berry |
| Autore | Berry David M (David Michael) |
| Pubbl/distr/stampa | London, : Pluto Press, 2008 |
| Descrizione fisica | 1 online resource (280 p.) |
| Disciplina |
303.482
005.3 |
| Soggetto topico |
Intercultural communication
Mass media and culture Open source intelligence |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-84964-455-1
1-282-00595-2 9786612005954 1-4356-9068-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910454699603321 |
Berry David M (David Michael)
|
||
| London, : Pluto Press, 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Copy, rip, burn [[electronic resource] ] : the politics of copyleft and open source / / David M. Berry
| Copy, rip, burn [[electronic resource] ] : the politics of copyleft and open source / / David M. Berry |
| Autore | Berry David M (David Michael) |
| Pubbl/distr/stampa | London, : Pluto Press, 2008 |
| Descrizione fisica | 1 online resource (280 p.) |
| Disciplina |
303.482
005.3 |
| Soggetto topico |
Intercultural communication
Mass media and culture Open source intelligence |
| ISBN |
1-84964-455-1
1-282-00595-2 9786612005954 1-4356-9068-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910782655703321 |
Berry David M (David Michael)
|
||
| London, : Pluto Press, 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques / / Sudhanshu Chauhan, Nutan Kumar Panda
| Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques / / Sudhanshu Chauhan, Nutan Kumar Panda |
| Autore | Chauhan Sudhanshu |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam, [Netherlands] : , : Syngress, , 2015 |
| Descrizione fisica | 1 online resource (301 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer networks - Security measures
World Wide Web Open source intelligence |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 - Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 - Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE
HOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3 - Understanding Browsers and Beyond; INTRODUCTION; BROWSER OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY BROWSERS; Chapter 4 - Search the Web-Beyond Convention; INTRODUCTION; Chapter 5 - Advanced Web Searching; INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6 - OSINT Tools and Techniques; INTRODUCTION; CREEPY THEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; Chapter 7 - Metadata; INTRODUCTION; METADATA EXTRACTION TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8 - Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9 - Deepweb: Exploring the Darkest Corners of the Internet; INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET SERVICES; DISCLAIMER; Chapter 10 - Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11 - Online Security; INTRODUCTION; MALWARES; PHISHING ONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; DATA ENCRYPTION; Chapter 12 - Basics of Social Networks Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE ATTRIBUTES; Chapter 13 - Quick and Dirty Python; INTRODUCTION; Chapter 14 - Case Studies and Examples; INTRODUCTION; CASE STUDIES; Chapter 15 - Related Topics of Interest; INTRODUCTION; CRYPTOGRAPHY DATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; Index |
| Record Nr. | UNINA-9910788136303321 |
Chauhan Sudhanshu
|
||
| Amsterdam, [Netherlands] : , : Syngress, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques / / Sudhanshu Chauhan, Nutan Kumar Panda
| Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques / / Sudhanshu Chauhan, Nutan Kumar Panda |
| Autore | Chauhan Sudhanshu |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam, [Netherlands] : , : Syngress, , 2015 |
| Descrizione fisica | 1 online resource (301 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer networks - Security measures
World Wide Web Open source intelligence |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 - Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 - Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE
HOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3 - Understanding Browsers and Beyond; INTRODUCTION; BROWSER OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY BROWSERS; Chapter 4 - Search the Web-Beyond Convention; INTRODUCTION; Chapter 5 - Advanced Web Searching; INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6 - OSINT Tools and Techniques; INTRODUCTION; CREEPY THEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; Chapter 7 - Metadata; INTRODUCTION; METADATA EXTRACTION TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8 - Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9 - Deepweb: Exploring the Darkest Corners of the Internet; INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET SERVICES; DISCLAIMER; Chapter 10 - Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11 - Online Security; INTRODUCTION; MALWARES; PHISHING ONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; DATA ENCRYPTION; Chapter 12 - Basics of Social Networks Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE ATTRIBUTES; Chapter 13 - Quick and Dirty Python; INTRODUCTION; Chapter 14 - Case Studies and Examples; INTRODUCTION; CASE STUDIES; Chapter 15 - Related Topics of Interest; INTRODUCTION; CRYPTOGRAPHY DATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; Index |
| Record Nr. | UNINA-9910821806203321 |
Chauhan Sudhanshu
|
||
| Amsterdam, [Netherlands] : , : Syngress, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Open source investigations in the age of Google / / editors, Henrietta Wilson, Olamide Samuel, Dan Plesch
| Open source investigations in the age of Google / / editors, Henrietta Wilson, Olamide Samuel, Dan Plesch |
| Disciplina | 327.12 |
| Soggetto topico |
Open source intelligence
Security, International Human rights monitoring Internet searching |
| ISBN | 1-80061-407-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910883693503321 |
| Lo trovi qui: Univ. Federico II | ||
|
The Tao of open source intelligence / / Stewart K. Bertram
| The Tao of open source intelligence / / Stewart K. Bertram |
| Autore | Bertram Stewart K. |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Cambridgeshire, England : , : IT Governance Publishing, , 2015 |
| Descrizione fisica | 1 online resource (137 pages) |
| Disciplina | 327.1202854678 |
| Soggetto topico | Open source intelligence |
| ISBN |
1-84928-730-9
1-84928-729-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction: "What Can Open Source Intelligence Do For Me -- The Surface Web -- Deep Web -- The Dark Web -- Internet Security for the Smart Investigator -- Conclusion -- Annex A: Tips for Building a Credible Sock Puppet. |
| Record Nr. | UNINA-9910797338803321 |
Bertram Stewart K.
|
||
| Cambridgeshire, England : , : IT Governance Publishing, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Tao of open source intelligence / / Stewart K. Bertram
| The Tao of open source intelligence / / Stewart K. Bertram |
| Autore | Bertram Stewart K. |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Cambridgeshire, England : , : IT Governance Publishing, , 2015 |
| Descrizione fisica | 1 online resource (137 pages) |
| Disciplina | 327.1202854678 |
| Soggetto topico | Open source intelligence |
| ISBN |
1-84928-730-9
1-84928-729-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction: "What Can Open Source Intelligence Do For Me -- The Surface Web -- Deep Web -- The Dark Web -- Internet Security for the Smart Investigator -- Conclusion -- Annex A: Tips for Building a Credible Sock Puppet. |
| Record Nr. | UNINA-9910816707503321 |
Bertram Stewart K.
|
||
| Cambridgeshire, England : , : IT Governance Publishing, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||