top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The 2018 Yearbook of the Digital Ethics Lab [[electronic resource] /] / edited by Carl Öhman, David Watson
The 2018 Yearbook of the Digital Ethics Lab [[electronic resource] /] / edited by Carl Öhman, David Watson
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (223 pages) : illustrations
Disciplina 174.96
Collana Digital Ethics Lab Yearbook
Soggetto topico Philosophy
Technology—Sociological aspects
Computer security
Ethics
Computer crimes
Philosophy of Technology
Science and Technology Studies
Privacy
Cybercrime
ISBN 3-030-17152-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: Digital Ethics: Goals and Approach (Carl Öhman, David Watson, Mariarosaria Taddeo, Luciano Floridi) -- Chapter 1. Digital Ethics: Its Nature and Scope (Luciano Floridi, Corinne Cath, Mariarosaria Taddeo) -- Chapter 2. Do We Need a Critical Evaluation of the Role of Mathematics in Data Science? (Patrick Allo) -- Chapter 3. Using Data From Git and GitHub in Ethnographies of Software Development (Andrew Turner) -- Chapter 4. The Price of Discovery: A Model of Scientific Research Markets (David Watson) -- Chapter 5. Projecting AI-Crime: A Review of Plausible Threats (Thomas King) -- Chapter 6. The Challenges of Cyber Deterrence (Mariarosaria Taddeo) -- Chapter 7. Internet Governance and Human Rights: A Literature Review (Corinne Cath) -- Chapter 8. Privacy Risks and Responses in the Digital Age (Josh Cowls) -- Chapter 9. Digitalised Legal Information: Towards a New Publication Model (Václav Janeček) -- Chapter 10. From Bones to Bytes: A New Chapter in the History of Death (Carl Öhman) -- Chapter 11. The Green and the Blue — Naïve Ideas to Improve Politics in a Mature Information Society (Luciano FLoridi).
Record Nr. UNINA-9910349541003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advance Metadata Fair [[electronic resource] ] : The Retention and Disclosure of 4G, 5G and Social Media Location Information, for Law Enforcement and National Security, and the Impact on Privacy in Australia / / by Stanley Shanapinda
Advance Metadata Fair [[electronic resource] ] : The Retention and Disclosure of 4G, 5G and Social Media Location Information, for Law Enforcement and National Security, and the Impact on Privacy in Australia / / by Stanley Shanapinda
Autore Shanapinda Stanley
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (231 pages)
Disciplina 910.285
Collana Law, Governance and Technology Series
Soggetto topico Mass media
Law
Computers
Law and legislation
Computer security
IT Law, Media Law, Intellectual Property
Legal Aspects of Computing
Privacy
ISBN 3-030-50255-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Dual Nature of Privacy – As a Target and as a Treasure to Protect: An Introduction -- The Legal Framework to Retain Location Information -- The Legal Framework to Collect and Disclose Location Information -- The Legal Framework to Retain and Disclose the Contents of a Communication -- The Powers of the Agencies to Collect and Use Location Information -- Location Information as Personal Information -- Limits to the Powers of the AFP and ASIO to Collect and Use Location Information -- External Oversight Exercised Over the Powers of the Agencies -- The IP-Mediated LTE Network versus the Law -- Proposing the Judicial Location Information Warrant.
Record Nr. UNINA-9910416138603321
Shanapinda Stanley  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Applications of Blockchain Technology [[electronic resource] /] / edited by Shiho Kim, Ganesh Chandra Deka
Advanced Applications of Blockchain Technology [[electronic resource] /] / edited by Shiho Kim, Ganesh Chandra Deka
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 278 p. 93 illus., 58 illus. in color.)
Disciplina 006.3
Collana Studies in Big Data
Soggetto topico Computational intelligence
Computer security
Big data
Computational Intelligence
Systems and Data Security
Big Data
Privacy
ISBN 981-13-8775-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction to Blockchain Technology and IoT -- IoT, AI, and Blockchain: Implementation perspectives -- Blockchain Technologies for IoT -- Blockchain Technology Use Cases -- Blockchain meets CyberSecurity: Security, Privacy, Challenges and Opportunity -- On the Role of Blockchain Technology in Internet of Things -- Blockchain of Things (BCoT): The Fusion of Blockchain and IoT Technologies -- Blockchain Architecture -- Authenticating IoT Devices with Blockchain -- Security & Privacy Issues of Block chain Technology -- Supply Chain Management in Agriculture Using Blockchain and IoT -- Blockchain Technologies and Artificial Intelligence -- Blockchain Hands on for Developing Genesis Block.
Record Nr. UNINA-9910484022203321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence Security and Privacy [[electronic resource] ] : First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part I / / edited by Jaideep Vaidya, Moncef Gabbouj, Jin Li
Artificial Intelligence Security and Privacy [[electronic resource] ] : First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part I / / edited by Jaideep Vaidya, Moncef Gabbouj, Jin Li
Autore Vaidya Jaideep
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (610 pages)
Disciplina 006.3
Altri autori (Persone) GabboujMoncef
LiJin
Collana Lecture Notes in Computer Science
Soggetto topico Artificial intelligence
Security systems
Data protection - Law and legislation
Cryptography
Data encryption (Computer science)
Data protection
Artificial Intelligence
Security Science and Technology
Privacy
Cryptology
Security Services
ISBN 981-9997-85-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fine-grained Searchable Encryption Scheme -- Fine-grained Authorized Secure Deduplication with Dynamic Policy -- Deep Multi-Image Hiding with Random Key -- Member Inference Attacks in Federated Contrastive Learning -- A network traffic anomaly detection method based on shapelet and KNN -- DFaP: Data Filtering and Purification Against Backdoor Attacks -- A Survey of Privacy Preserving Subgraph Matching Method -- The Analysis of Schnorr Multi-Signatures and the Application to AI -- Active Defense against Image Steganography -- Strict Differentially Private Support Vector Machines with Dimensionality Reduction -- Converging Blockchain and Deep Learning in UAV Network Defense Strategy: Ensuring Data Security During Flight -- Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future Directions -- From Passive Defense to Proactive Defence: Strategies and Technologies -- Research on Surface Defect Detection System of Chip Inductors Based on Machine Vision -- Multimodal fatigue detection in drivers via physiological and visual signals -- Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense -- FedCMK: An Efficient Privacy-Preserving Federated Learning Framework -- An embedded cost learning framework based on cumulative gradient -- An Assurance Case Practice of AI-enabled Systems on Maritime Inspection -- Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification -- A Verifiable Dynamic Multi-Secret Sharing Obfuscation Scheme Applied to Data LakeHouse -- DZIP: A Data Deduplication-Compatible Enhanced Version of Gzip -- Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security -- Adversarial Attacks against Object Detection in Remote Sensing Images -- Hardware Implementation and Optimization of Critical Modules of SM9 Digital Signature Algorithm -- Post-quantum Dropout-resilient Aggregation for Federated Learning via Lattice-based PRF -- Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication -- IoT-Inspired Education 4.0 Framework for Higher Education and Industry Needs -- Multi-agent Reinforcement Learning Based User-Centric Demand Response with Non-Intrusive Load Monitoring -- Decision Poisson: From universal gravitation to offline reinforcement learning -- SSL-ABD:An Adversarial Defense MethodAgainst Backdoor Attacks in Self-supervised Learning -- Personalized Differential Privacy in the Shuffle Model -- MKD: Mutual Knowledge Distillation for Membership Privacy Protection -- Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm -- KEP: Keystroke Evoked Potential for EEG-based User Authentication -- Verifiable Secure Aggregation Protocol under Federated Learning -- Electronic voting privacy protection scheme based on double signature in Consortium Blockchain -- Securing 5G Positioning via Zero Trust Architecture -- Email Reading Behavior-informed Machine Learning Model to Predict Phishing Susceptibility. .
Record Nr. UNINA-9910831010203321
Vaidya Jaideep  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence Security and Privacy [[electronic resource] ] : First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part II / / edited by Jaideep Vaidya, Moncef Gabbouj, Jin Li
Artificial Intelligence Security and Privacy [[electronic resource] ] : First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3–5, 2023, Proceedings, Part II / / edited by Jaideep Vaidya, Moncef Gabbouj, Jin Li
Autore Vaidya Jaideep
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (293 pages)
Disciplina 006.3
Altri autori (Persone) GabboujMoncef
LiJin
Collana Lecture Notes in Computer Science
Soggetto topico Artificial intelligence
Security systems
Data protection - Law and legislation
Cryptography
Data encryption (Computer science)
Data protection
Artificial Intelligence
Security Science and Technology
Privacy
Cryptology
Security Services
ISBN 981-9997-88-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Application of lattice-based unique ring signature in blockchain transactions -- Rethinking Distribution Alignment for Inter-class Fairness -- Online Learning Behavior Analysis and Achievement Prediction with Explainable Machine Learning -- A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing -- A graph-based vertical federation broad learning system -- EPoLORE: Efficient and Privacy Preserved Logistic Regression scheme -- Multi-dimensional Data Aggregation Scheme without a Trusted Third Party in Smart Grid -- Using Micro Videos to Optimize Premiere Software Course Teaching -- The Design and Implementation of Python Knowledge Graph for Programming Teaching -- An Improved Prototypical Network for Endoscopic Grading of Intestinal Metaplasia -- Secure Position-aware Graph Neural Networks for Session-based Recommendation -- Design of a Fast Recognition Method for College Students' Classroom Expression Images Based on Deep Learning -- Research on ALSTM-SVR based Traffic Flow prediction adaptive beacon message Joint control -- An Improved Hybrid Sampling Model for Network Intrusion Detection Based on Data Imbalance -- Using the SGE-CGAM Method to Address Class Imbalance Issues in Network Intrusion Detection -- A Study of Adaptive Algorithm for Dynamic Adjustment of Transmission Power and Contention Window -- Deep learning-based lung nodule segmentation and 3D reconstruction algorithm for CT images -- GridFormer: Grid foreign object detection also requires Transformer -- An Anomaly Detection and Localization Method Based on Feature Fusion and Attention -- Ensemble of Deep Convolutional Network for Citrus Disease Classification using Leaf Images -- PM2.5 Monitoring And Prediction Basing On IOT And RNN Neural Network -- An image zero watermark algorithm based on DINOv2 and multiple cycle transformation -- An image copyright authentication model based on blockchain and digital watermark.
Record Nr. UNINA-9910831003703321
Vaidya Jaideep  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Autore Steffens Timo
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Descrizione fisica 1 online resource (XIV, 205 p. 49 illus.)
Disciplina 005.8
Soggetto topico Computer security
Computers
Law and legislation
Computer communication systems
Application software
Systems and Data Security
Legal Aspects of Computing
Privacy
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-662-61313-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advanced Persistent Threats -- The attribution process.-Analysis of malware -- Attack infrastructure -- Analysis of control servers -- Geopolitical analysis -- Telemetry - data from security products -- Methods of intelligence agencies -- Doxing -- False flags -- Group set-ups -- Communication -- Ethics of attribution.
Record Nr. UNINA-9910413440203321
Steffens Timo  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Attribution of Advanced Persistent Threats [[electronic resource] ] : How to Identify the Actors Behind Cyber-Espionage / / by Timo Steffens
Autore Steffens Timo
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Descrizione fisica 1 online resource (XIV, 205 p. 49 illus.)
Disciplina 005.8
Soggetto topico Computer security
Computers
Law and legislation
Computer communication systems
Application software
Systems and Data Security
Legal Aspects of Computing
Privacy
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-662-61313-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advanced Persistent Threats -- The attribution process.-Analysis of malware -- Attack infrastructure -- Analysis of control servers -- Geopolitical analysis -- Telemetry - data from security products -- Methods of intelligence agencies -- Doxing -- False flags -- Group set-ups -- Communication -- Ethics of attribution.
Record Nr. UNISA-996465367703316
Steffens Timo  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Autonomous Intelligent Cyber Defense Agent (AICA) [[electronic resource] ] : A Comprehensive Guide / / edited by Alexander Kott
Autonomous Intelligent Cyber Defense Agent (AICA) [[electronic resource] ] : A Comprehensive Guide / / edited by Alexander Kott
Autore Kott Alexander
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (468 pages)
Disciplina 355.45
Collana Advances in Information Security
Soggetto topico Artificial intelligence
Computer networks—Security measures
Data protection—Law and legislation
Artificial Intelligence
Mobile and Network Security
Privacy
Soggetto non controllato Military Art And Science
Technology & Engineering
ISBN 3-031-29269-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents.
Record Nr. UNISA-996546821903316
Kott Alexander  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Autonomous Intelligent Cyber Defense Agent (AICA) [[electronic resource] ] : A Comprehensive Guide / / edited by Alexander Kott
Autonomous Intelligent Cyber Defense Agent (AICA) [[electronic resource] ] : A Comprehensive Guide / / edited by Alexander Kott
Autore Kott Alexander
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (468 pages)
Disciplina 355.45
Collana Advances in Information Security
Soggetto topico Artificial intelligence
Computer networks—Security measures
Data protection—Law and legislation
Artificial Intelligence
Mobile and Network Security
Privacy
Soggetto non controllato Military Art And Science
Technology & Engineering
ISBN 3-031-29269-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview -- Chapter. 2. Alternative Architectural Approaches -- Chapter. 3. Perception of Environment -- Chapter. 4. Perception of Cyber Threats -- Chapter. 5. Situational Understanding and Diagnostics -- Chapter. 6. Learning about the Adversary -- Chapter. 7. Response Planning -- Chapter. 8. Recovery Planning -- Chapter. 9. Strategic Cyber Camouflage -- Chapter. 10. Adaptivity & Antifragility -- Chapter. 11. Negotiation and Collaboration -- Chapter. 12. Human Interactions -- Chapter. 13. Testing and Measurements -- Chapter. 14. Deployment and Operation -- Chapter. 15. Command in AICA-intensive Operations -- Chapter. 16. Risk Management -- Chapter. 17. Policy Issues -- Chapter. 18. Development Challenges -- Chapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense Agent -- Chapter. 20. Case Study B: AI Agents for Tactical Edge -- Chapter. 21. Case Study C: the Sentinel Agents.
Record Nr. UNINA-9910728948603321
Kott Alexander  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain and Clinical Trial [[electronic resource] ] : Securing Patient Data / / edited by Hamid Jahankhani, Stefan Kendzierskyj, Arshad Jamal, Gregory Epiphaniou, Haider Al-Khateeb
Blockchain and Clinical Trial [[electronic resource] ] : Securing Patient Data / / edited by Hamid Jahankhani, Stefan Kendzierskyj, Arshad Jamal, Gregory Epiphaniou, Haider Al-Khateeb
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (270 pages)
Disciplina 005.74
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer security
Health informatics
System safety
Systems and Data Security
Privacy
Health Informatics
Security Science and Technology
ISBN 3-030-11289-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- Blockchain and Healthcare -- Digital Transformation of Healthcare -- Healthcare Patient and Clinical Research -- Information security governance, technology, processes and people: Compliance and organisational readiness; B. Papp-Silva et al -- Cyber-Physical Attacks and the Value of Healthcare Data: Facing an Era of Cyber Extortion and Organised Crime -- The Transparency of Big Data, Data Harvesting and Digital Twins -- Blockchain for Modern Digital Forensics: The Chain-of-Custody as a Distributed Ledger -- The Standardised Digital Forensic Investigation Process Model (SDFIPM) -- Hybrid Cyber security framework for the internet of medical things -- BMAR - Blockchain for Medication Administration Records -- Recent Cyber Attacks and Vulnerabilities in Medical Devices and Healthcare Institutions.
Record Nr. UNINA-9910337850303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...