The 2018 Yearbook of the Digital Ethics Lab [[electronic resource] /] / edited by Carl Öhman, David Watson |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (223 pages) : illustrations |
Disciplina | 174.96 |
Collana | Digital Ethics Lab Yearbook |
Soggetto topico |
Philosophy
Technology—Sociological aspects Computer security Ethics Computer crimes Philosophy of Technology Science and Technology Studies Privacy Cybercrime |
ISBN | 3-030-17152-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction: Digital Ethics: Goals and Approach (Carl Öhman, David Watson, Mariarosaria Taddeo, Luciano Floridi) -- Chapter 1. Digital Ethics: Its Nature and Scope (Luciano Floridi, Corinne Cath, Mariarosaria Taddeo) -- Chapter 2. Do We Need a Critical Evaluation of the Role of Mathematics in Data Science? (Patrick Allo) -- Chapter 3. Using Data From Git and GitHub in Ethnographies of Software Development (Andrew Turner) -- Chapter 4. The Price of Discovery: A Model of Scientific Research Markets (David Watson) -- Chapter 5. Projecting AI-Crime: A Review of Plausible Threats (Thomas King) -- Chapter 6. The Challenges of Cyber Deterrence (Mariarosaria Taddeo) -- Chapter 7. Internet Governance and Human Rights: A Literature Review (Corinne Cath) -- Chapter 8. Privacy Risks and Responses in the Digital Age (Josh Cowls) -- Chapter 9. Digitalised Legal Information: Towards a New Publication Model (Václav Janeček) -- Chapter 10. From Bones to Bytes: A New Chapter in the History of Death (Carl Öhman) -- Chapter 11. The Green and the Blue — Naïve Ideas to Improve Politics in a Mature Information Society (Luciano FLoridi). |
Record Nr. | UNINA-9910349541003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advance Metadata Fair [[electronic resource] ] : The Retention and Disclosure of 4G, 5G and Social Media Location Information, for Law Enforcement and National Security, and the Impact on Privacy in Australia / / by Stanley Shanapinda |
Autore | Shanapinda Stanley |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (231 pages) |
Disciplina | 910.285 |
Collana | Law, Governance and Technology Series |
Soggetto topico |
Mass media
Law Computers Law and legislation Computer security IT Law, Media Law, Intellectual Property Legal Aspects of Computing Privacy |
ISBN | 3-030-50255-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Dual Nature of Privacy – As a Target and as a Treasure to Protect: An Introduction -- The Legal Framework to Retain Location Information -- The Legal Framework to Collect and Disclose Location Information -- The Legal Framework to Retain and Disclose the Contents of a Communication -- The Powers of the Agencies to Collect and Use Location Information -- Location Information as Personal Information -- Limits to the Powers of the AFP and ASIO to Collect and Use Location Information -- External Oversight Exercised Over the Powers of the Agencies -- The IP-Mediated LTE Network versus the Law -- Proposing the Judicial Location Information Warrant. |
Record Nr. | UNINA-9910416138603321 |
Shanapinda Stanley
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Applications of Blockchain Technology [[electronic resource] /] / edited by Shiho Kim, Ganesh Chandra Deka |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 278 p. 93 illus., 58 illus. in color.) |
Disciplina | 006.3 |
Collana | Studies in Big Data |
Soggetto topico |
Computational intelligence
Computer security Big data Computational Intelligence Systems and Data Security Big Data Privacy |
ISBN | 981-13-8775-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction to Blockchain Technology and IoT -- IoT, AI, and Blockchain: Implementation perspectives -- Blockchain Technologies for IoT -- Blockchain Technology Use Cases -- Blockchain meets CyberSecurity: Security, Privacy, Challenges and Opportunity -- On the Role of Blockchain Technology in Internet of Things -- Blockchain of Things (BCoT): The Fusion of Blockchain and IoT Technologies -- Blockchain Architecture -- Authenticating IoT Devices with Blockchain -- Security & Privacy Issues of Block chain Technology -- Supply Chain Management in Agriculture Using Blockchain and IoT -- Blockchain Technologies and Artificial Intelligence -- Blockchain Hands on for Developing Genesis Block. |
Record Nr. | UNINA-9910484022203321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial Intelligence Security and Privacy [[electronic resource] ] : First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part I / / edited by Jaideep Vaidya, Moncef Gabbouj, Jin Li |
Autore | Vaidya Jaideep |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (610 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
GabboujMoncef
LiJin |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Artificial intelligence
Security systems Data protection - Law and legislation Cryptography Data encryption (Computer science) Data protection Artificial Intelligence Security Science and Technology Privacy Cryptology Security Services |
ISBN | 981-9997-85-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fine-grained Searchable Encryption Scheme -- Fine-grained Authorized Secure Deduplication with Dynamic Policy -- Deep Multi-Image Hiding with Random Key -- Member Inference Attacks in Federated Contrastive Learning -- A network traffic anomaly detection method based on shapelet and KNN -- DFaP: Data Filtering and Purification Against Backdoor Attacks -- A Survey of Privacy Preserving Subgraph Matching Method -- The Analysis of Schnorr Multi-Signatures and the Application to AI -- Active Defense against Image Steganography -- Strict Differentially Private Support Vector Machines with Dimensionality Reduction -- Converging Blockchain and Deep Learning in UAV Network Defense Strategy: Ensuring Data Security During Flight -- Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future Directions -- From Passive Defense to Proactive Defence: Strategies and Technologies -- Research on Surface Defect Detection System of Chip Inductors Based on Machine Vision -- Multimodal fatigue detection in drivers via physiological and visual signals -- Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense -- FedCMK: An Efficient Privacy-Preserving Federated Learning Framework -- An embedded cost learning framework based on cumulative gradient -- An Assurance Case Practice of AI-enabled Systems on Maritime Inspection -- Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification -- A Verifiable Dynamic Multi-Secret Sharing Obfuscation Scheme Applied to Data LakeHouse -- DZIP: A Data Deduplication-Compatible Enhanced Version of Gzip -- Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security -- Adversarial Attacks against Object Detection in Remote Sensing Images -- Hardware Implementation and Optimization of Critical Modules of SM9 Digital Signature Algorithm -- Post-quantum Dropout-resilient Aggregation for Federated Learning via Lattice-based PRF -- Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication -- IoT-Inspired Education 4.0 Framework for Higher Education and Industry Needs -- Multi-agent Reinforcement Learning Based User-Centric Demand Response with Non-Intrusive Load Monitoring -- Decision Poisson: From universal gravitation to offline reinforcement learning -- SSL-ABD:An Adversarial Defense MethodAgainst Backdoor Attacks in Self-supervised Learning -- Personalized Differential Privacy in the Shuffle Model -- MKD: Mutual Knowledge Distillation for Membership Privacy Protection -- Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm -- KEP: Keystroke Evoked Potential for EEG-based User Authentication -- Verifiable Secure Aggregation Protocol under Federated Learning -- Electronic voting privacy protection scheme based on double signature in Consortium Blockchain -- Securing 5G Positioning via Zero Trust Architecture -- Email Reading Behavior-informed Machine Learning Model to Predict Phishing Susceptibility. . |
Record Nr. | UNINA-9910831010203321 |
Vaidya Jaideep
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial Intelligence Security and Privacy [[electronic resource] ] : First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part II / / edited by Jaideep Vaidya, Moncef Gabbouj, Jin Li |
Autore | Vaidya Jaideep |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (293 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
GabboujMoncef
LiJin |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Artificial intelligence
Security systems Data protection - Law and legislation Cryptography Data encryption (Computer science) Data protection Artificial Intelligence Security Science and Technology Privacy Cryptology Security Services |
ISBN | 981-9997-88-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Application of lattice-based unique ring signature in blockchain transactions -- Rethinking Distribution Alignment for Inter-class Fairness -- Online Learning Behavior Analysis and Achievement Prediction with Explainable Machine Learning -- A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing -- A graph-based vertical federation broad learning system -- EPoLORE: Efficient and Privacy Preserved Logistic Regression scheme -- Multi-dimensional Data Aggregation Scheme without a Trusted Third Party in Smart Grid -- Using Micro Videos to Optimize Premiere Software Course Teaching -- The Design and Implementation of Python Knowledge Graph for Programming Teaching -- An Improved Prototypical Network for Endoscopic Grading of Intestinal Metaplasia -- Secure Position-aware Graph Neural Networks for Session-based Recommendation -- Design of a Fast Recognition Method for College Students' Classroom Expression Images Based on Deep Learning -- Research on ALSTM-SVR based Traffic Flow prediction adaptive beacon message Joint control -- An Improved Hybrid Sampling Model for Network Intrusion Detection Based on Data Imbalance -- Using the SGE-CGAM Method to Address Class Imbalance Issues in Network Intrusion Detection -- A Study of Adaptive Algorithm for Dynamic Adjustment of Transmission Power and Contention Window -- Deep learning-based lung nodule segmentation and 3D reconstruction algorithm for CT images -- GridFormer: Grid foreign object detection also requires Transformer -- An Anomaly Detection and Localization Method Based on Feature Fusion and Attention -- Ensemble of Deep Convolutional Network for Citrus Disease Classification using Leaf Images -- PM2.5 Monitoring And Prediction Basing On IOT And RNN Neural Network -- An image zero watermark algorithm based on DINOv2 and multiple cycle transformation -- An image copyright authentication model based on blockchain and digital watermark. |
Record Nr. | UNINA-9910831003703321 |
Vaidya Jaideep
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens |
Autore | Steffens Timo |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 |
Descrizione fisica | 1 online resource (XIV, 205 p. 49 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computers Law and legislation Computer communication systems Application software Systems and Data Security Legal Aspects of Computing Privacy Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-662-61313-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Advanced Persistent Threats -- The attribution process.-Analysis of malware -- Attack infrastructure -- Analysis of control servers -- Geopolitical analysis -- Telemetry - data from security products -- Methods of intelligence agencies -- Doxing -- False flags -- Group set-ups -- Communication -- Ethics of attribution. |
Record Nr. | UNINA-9910413440203321 |
Steffens Timo
![]() |
||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens |
Autore | Steffens Timo |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 |
Descrizione fisica | 1 online resource (XIV, 205 p. 49 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computers Law and legislation Computer communication systems Application software Systems and Data Security Legal Aspects of Computing Privacy Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-662-61313-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Advanced Persistent Threats -- The attribution process.-Analysis of malware -- Attack infrastructure -- Analysis of control servers -- Geopolitical analysis -- Telemetry - data from security products -- Methods of intelligence agencies -- Doxing -- False flags -- Group set-ups -- Communication -- Ethics of attribution. |
Record Nr. | UNISA-996465367703316 |
Steffens Timo
![]() |
||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Autonomous Intelligent Cyber Defense Agent (AICA) [[electronic resource] ] : A Comprehensive Guide / / edited by Alexander Kott |
Autore | Kott Alexander |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (468 pages) |
Disciplina | 355.45 |
Collana | Advances in Information Security |
Soggetto topico |
Artificial intelligence
Computer networks—Security measures Data protection—Law and legislation Artificial Intelligence Mobile and Network Security Privacy |
Soggetto non controllato |
Military Art And Science
Technology & Engineering |
ISBN | 3-031-29269-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents. |
Record Nr. | UNISA-996546821903316 |
Kott Alexander
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Autonomous Intelligent Cyber Defense Agent (AICA) [[electronic resource] ] : A Comprehensive Guide / / edited by Alexander Kott |
Autore | Kott Alexander |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (468 pages) |
Disciplina | 355.45 |
Collana | Advances in Information Security |
Soggetto topico |
Artificial intelligence
Computer networks—Security measures Data protection—Law and legislation Artificial Intelligence Mobile and Network Security Privacy |
Soggetto non controllato |
Military Art And Science
Technology & Engineering |
ISBN | 3-031-29269-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents. |
Record Nr. | UNINA-9910728948603321 |
Kott Alexander
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain and Clinical Trial [[electronic resource] ] : Securing Patient Data / / edited by Hamid Jahankhani, Stefan Kendzierskyj, Arshad Jamal, Gregory Epiphaniou, Haider Al-Khateeb |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (270 pages) |
Disciplina | 005.74 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
Health informatics System safety Systems and Data Security Privacy Health Informatics Security Science and Technology |
ISBN | 3-030-11289-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Blockchain and Healthcare -- Digital Transformation of Healthcare -- Healthcare Patient and Clinical Research -- Information security governance, technology, processes and people: Compliance and organisational readiness; B. Papp-Silva et al -- Cyber-Physical Attacks and the Value of Healthcare Data: Facing an Era of Cyber Extortion and Organised Crime -- The Transparency of Big Data, Data Harvesting and Digital Twins -- Blockchain for Modern Digital Forensics: The Chain-of-Custody as a Distributed Ledger -- The Standardised Digital Forensic Investigation Process Model (SDFIPM) -- Hybrid Cyber security framework for the internet of medical things -- BMAR - Blockchain for Medication Administration Records -- Recent Cyber Attacks and Vulnerabilities in Medical Devices and Healthcare Institutions. |
Record Nr. | UNINA-9910337850303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|