top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
7th International Conference on Education, Network and Information Technology / / edited by Jingsha He, Ljiljana Trajković
7th International Conference on Education, Network and Information Technology / / edited by Jingsha He, Ljiljana Trajković
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XIV, 389 p. 156 illus., 124 illus. in color.)
Disciplina 006.3
Collana EAI/Springer Innovations in Communication and Computing
Soggetto topico Computational intelligence
Technological innovations
Electronic commerce
Computational Intelligence
Innovation and Technology Management
e-Commerce and e-Business
ISBN 3-031-85225-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Development of virtual experimental system for parallel shaft automatic transmission -- Chapter 2: Design of Ideological and Political Teaching Resource Platform for Artificial Intelligence Course -- Chapter 3: Design and Learning Effectiveness Algorithm of Online Teaching Interactive System -- Chapter 4: Automatic Evaluation of English Writing: Combining TF-IDF and Text Similarity Algorithm -- Chapter 5: User Behavior Analysis and Personalized Recommendation Algorithm in an Online Learning Platform Based on Deep Learning -- Chapter 6: Expansion of Chinese Lexicon and Language Model Optimization in the Perspective of Big Data Using the Word2Vec Model -- Chapter 7: Big Data-driven Talent Development Program: A Study Based on Association Rule Mining -- Chapter 8: Design and Optimization of Financial Course System Based on Improved SDAE Network -- Chapter 9: Smart Teaching Knowledge Topic Mining and Interdisciplinary Research Using Latent Dirichlet Allocation Taking the Corpus as an Example -- Chapter 10: Generative Adversarial Networks for Realistic Generation of Children's Learning State Data -- Chapter 11: Application of Collaborative Filtering Algorithm in a Preschool Education Resource Sharing Platform -- Chapter 12: Automatic Evaluation of English Oral Proficiency: Feature Selection and Performance Optimization Based on Decision Trees -- Chapter 13: A method for constructing lightweight AI experimental platform -- Chapter 14: Research on personalized test question recommendation algorithm based on Knowledge Map -- Chapter 15: Design and Development of English Vocabulary Memory Game Based on Android Platform -- Chapter 16: Technology-supported writing instruction: A systematic literature review and meta-analysis -- Chapter 17: Design and Implementation of Learning Resource Exchange Platform APP Based on Android -- Chapter 18: Reform of "Ship Awareness Internship" Course Based on AI Intelligent Tutoring System in the Context of Engineering Certification -- Chapter 19: Research on Visual Teaching Based on Python Technology Application -- Chapter 20: Design and Implementation of an English Intelligent Dialogue System Based on Deep Learning Algorithms -- Chapter 21: The Application of Data Mining Technology in Student Management System -- Chapter 22: Student Management System Based on Artificial Intelligence and Digital Technology -- Chapter 23: Research on teaching skills and postures of normal university students based on OpenPose -- Chapter 24: Three-dimensional Simulation of the Tower of Hanoi using an Improved Recursive Algorithm and Multipatch -- Chapter 25: Design and Implementation of an Intelligent Assisted Learning System for Discrete Mathematics -- Chapter 26: Research on the cubic spline interpolation algorithm for predicting the demand of medical laboratory teachers in vocational colleges -- Chapter 27: Research on Risk Feature Extraction and Prevention Model Construction Based on XGBoost Algorithm -- Chapter 28: Method for Evaluating the Comprehensive Quality of Polytechnic College Students by Integrating Virtual Human-Computer Interaction Assessment.
Record Nr. UNINA-9911007352103321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Achieving Business Competitiveness in a Digital Environment : Opportunities in E-commerce and Online Marketing / / edited by Tereza Semerádová, Petr Weinlich​
Achieving Business Competitiveness in a Digital Environment : Opportunities in E-commerce and Online Marketing / / edited by Tereza Semerádová, Petr Weinlich​
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (247 pages)
Disciplina 658.872
Collana Contributions to Management Science
Soggetto topico Telemarketing
Internet marketing
Electronic commerce
Strategic planning
Leadership
Digital Marketing
e-Commerce and e-Business
Business Strategy and Leadership
ISBN 3-030-93131-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. The Broad and Narrow Definition of E-Commerce -- 2. Evaluative Framework for Digital Competitiveness -- 3. Website-Centric Shoping Experience -- 4. Socially Responsible Online Marketing- 5. Algorithms – the New Leaders of the Advertising Market -- 6. The Credibility of Online Recommendations -- 7. The Relationship Between Product Placement and Shopping Intentions on Instagram -- 8. Product Endorssment by Opinion Leaders – the Case of Youtube Community.
Record Nr. UNINA-9910522944903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Bias and Fairness in Information Retrieval : 5th International Workshop, BIAS 2024, Washington, DC, USA, July 18, 2024, Revised Selected Papers / / edited by Alejandro Bellogin, Ludovico Boratto, Styliani Kleanthous, Elisabeth Lex, Francesca Maridina Malloci, Mirko Marras
Advances in Bias and Fairness in Information Retrieval : 5th International Workshop, BIAS 2024, Washington, DC, USA, July 18, 2024, Revised Selected Papers / / edited by Alejandro Bellogin, Ludovico Boratto, Styliani Kleanthous, Elisabeth Lex, Francesca Maridina Malloci, Mirko Marras
Autore Bellogin Alejandro
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (113 pages)
Disciplina 004.6
Altri autori (Persone) BorattoLudovico
KleanthousStyliani
LexElisabeth
MallociFrancesca Maridina
MarrasMirko
Collana Communications in Computer and Information Science
Soggetto topico Computer networks
Artificial intelligence
Electronic commerce
Computer Communication Networks
Artificial Intelligence
e-Commerce and e-Business
ISBN 3-031-71975-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Offer you Cannot Refuse? Trends in the Coercive Impact of Amazon Book Recommendations -- Retention Induced Biases in a Recommendation System with Heterogeneous Users -- Political Bias of Large Language Models in Few-shot News Summarization -- Fairness Analysis of Machine Learning-Based Code Reviewer Recommendation -- Bias Reduction in Social Networks through Agent-Based Simulations -- vivaFemme: Mitigating Gender Bias in Neural Team Recommendation via Female-Advocate Loss Regularization -- Simultaneous Unlearning of Multiple Protected User Attributes From Variational Autoencoder Recommenders Using Adversarial Training.
Record Nr. UNINA-9910983492903321
Bellogin Alejandro  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Bias and Fairness in Information Retrieval [[electronic resource] ] : 4th International Workshop, BIAS 2023, Dublin, Ireland, April 2, 2023, Revised Selected Papers / / edited by Ludovico Boratto, Stefano Faralli, Mirko Marras, Giovanni Stilo
Advances in Bias and Fairness in Information Retrieval [[electronic resource] ] : 4th International Workshop, BIAS 2023, Dublin, Ireland, April 2, 2023, Revised Selected Papers / / edited by Ludovico Boratto, Stefano Faralli, Mirko Marras, Giovanni Stilo
Autore Boratto Ludovico
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (187 pages)
Disciplina 025.524
Altri autori (Persone) FaralliStefano
MarrasMirko
StiloGiovanni
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Electronic commerce
Computer Engineering and Networks
Artificial Intelligence
e-Commerce and e-Business
ISBN 3-031-37249-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Study on Accuracy, Miscalibration, and Popularity Bias in Recommendations -- Measuring Bias in Multimodal Models: Multimodal Composite Association Score -- Evaluating Fairness Metrics -- Utilizing Implicit Feedback for User Mainstreaminess Evaluation and Bias Detection in Recommender Systems -- Preserving Utility in Fair Top-k Ranking with Intersectional Bias -- Mitigating Position Bias in Hotels Recommender Systems -- Improving Recommender System Diversity with Variational Autoencoders -- Addressing Biases in the Texts using an End-to-End Pipeline Approach -- Bootless Application of Greedy Re-ranking Algorithms in Fair Neural Team Formation -- How do you feel? Information Retrieval in Psychotherapy and Fair Ranking Assessment -- Understanding Search Behavior Bias in Wikipedia -- Do you MIND? Reflections on the MIND dataset for research on diversity in news recommendations -- Detecting and Measuring Social Bias of Arabic Generative Models in the Context of Search and Recommendation -- What are we missing in algorithmic fairness? Discussing open challenges for fairness analysis in user profiling with Graph Neural Networks.
Record Nr. UNISA-996546825403316
Boratto Ludovico  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Bias and Fairness in Information Retrieval : 4th International Workshop, BIAS 2023, Dublin, Ireland, April 2, 2023, Revised Selected Papers / / edited by Ludovico Boratto, Stefano Faralli, Mirko Marras, Giovanni Stilo
Advances in Bias and Fairness in Information Retrieval : 4th International Workshop, BIAS 2023, Dublin, Ireland, April 2, 2023, Revised Selected Papers / / edited by Ludovico Boratto, Stefano Faralli, Mirko Marras, Giovanni Stilo
Autore Boratto Ludovico
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (187 pages)
Disciplina 025.524
Altri autori (Persone) FaralliStefano
MarrasMirko
StiloGiovanni
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Electronic commerce
Computer Engineering and Networks
Artificial Intelligence
e-Commerce and e-Business
Aprenentatge automàtic
Xarxes neuronals (Informàtica)
Intel·ligència artificial
Algorismes
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 9783031372490
3031372492
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Study on Accuracy, Miscalibration, and Popularity Bias in Recommendations -- Measuring Bias in Multimodal Models: Multimodal Composite Association Score -- Evaluating Fairness Metrics -- Utilizing Implicit Feedback for User Mainstreaminess Evaluation and Bias Detection in Recommender Systems -- Preserving Utility in Fair Top-k Ranking with Intersectional Bias -- Mitigating Position Bias in Hotels Recommender Systems -- Improving Recommender System Diversity with Variational Autoencoders -- Addressing Biases in the Texts using an End-to-End Pipeline Approach -- Bootless Application of Greedy Re-ranking Algorithms in Fair Neural Team Formation -- How do you feel? Information Retrieval in Psychotherapy and Fair Ranking Assessment -- Understanding Search Behavior Bias in Wikipedia -- Do you MIND? Reflections on the MIND dataset for research on diversity in news recommendations -- Detecting and Measuring Social Bias of Arabic Generative Models in the Context of Search and Recommendation -- What are we missing in algorithmic fairness? Discussing open challenges for fairness analysis in user profiling with Graph Neural Networks.
Record Nr. UNINA-9910734876903321
Boratto Ludovico  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XX, 335 p. 67 illus.)
Disciplina 364.168
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Electronic commerce
Information technology - Management
Cryptography
Data encryption (Computer science)
Data and Information Security
Computers and Society
e-Commerce and e-Business
Computer Application in Administrative Data Processing
Cryptology
ISBN 3-662-44952-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection -- Using Fraud Trees to Analyze Internet Credit Card Fraud -- Automated Analysis of Underground Marketplaces -- An Exploratory Profiling Study of Online Auction Fraudsters -- Web User Profiling Based on Browsing Behavior Analysis -- Validation Rules for Enhanced Foxy P2P Network Investigations -- Windows Event Forensic Process -- Schema Reconstruction in Database Forensics -- Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus -- Similarity Hashing Based on Levenshtein Distance -- Using Approximate Matching to Reduce the Volume of Digital Data -- Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion -- Breaking the Closed-World Assumption in Stylometric Authorship Attribution -- Preserving Dates and Timestamps for Incident Handling in Android Smartphones -- An Open Source Toolkit for iOS Filesystem Forensics -- Smartphones as Distributed Witnesses for Digital Forensics -- Smartphone Message Sentiment Analysis -- Forensic Analysis of the TomTom Navigation Application -- Performance of a Logical Five-Phase, Multithreaded, Bootable Triage Tool -- Towards Fully Automated Digital Alibis with Social Interactions -- Data Corpora for Digital Forensics Education and Research -- Educating the Next Generation of Cyberforensic Professionals.
Record Nr. UNINA-9910298995803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 357 p. 74 illus. in color.)
Disciplina 363.25968
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Electronic commerce
Information technology - Management
Cryptography
Data encryption (Computer science)
Data and Information Security
Computers and Society
e-Commerce and e-Business
Computer Application in Administrative Data Processing
Cryptology
ISBN 3-319-24123-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- THEMES AND ISSUES -- A TALE OF TWO TRACES - DIPLOMATICS AND FORENSICS -- 1. Introduction -- 1.1 Causality as a Foundation of Science -- 1.2 Diplomatics -- 1.3 Archival Science and Public Records -- 1.4 Digital Records -- 1.5 Digital Diplomatics -- 1.6 Forensic Science -- 1.7 Digital Forensics -- 2. Digital Diplomatics and Forensics -- 2.1 Case 1 Background -- 2.2 Case 2 Background -- 2.3 Admitting the Documents -- 2.4 Related Information on Records -- 3. Case Resolution -- 3.1 Case 1 -- 3.2 Case 2 -- 4. Implications and the Path Forward -- 4.1 Implications -- 4.2 The Path Forward -- 5. Conclusions -- References -- NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS -- 1. Motivation -- 2. Related Work -- 3. Carrier's Work -- 3.1 History Duration -- 3.2 Primitive Storage System Configuration -- 3.3 Primitive Event System Configuration -- 3.4 Primitive State and Event Definition -- 3.5 Complex Storage System Configuration -- 3.6 Complex Event System Configuration -- 3.7 Complex State and Event Definition -- 4. Bunge's Classification -- 5. Limitations of the Study -- 6. Conclusions -- References -- USING YIN'S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS -- 1. Introduction -- 2. Understanding a Case -- 2.1 What is a Case? -- 2.2 Case Study Design -- 2.3 Case Study Design -- 3. Digital Forensic Case Studies -- 3.1 Case Study 1 -- 3.2 Case Study 2 -- 3.3 Case Study 3 -- 4. Analytic Generalizations -- 5. Assessing Case Study Quality -- 6. Conclusions -- References -- AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS -- 1. Introduction -- 2. Related Work -- 3. Information Extraction Framework -- 3.1 Named Entity Recognition -- 3.2 Relation Extraction -- 4. Experiments and Analysis -- 4.1 Dataset Description -- 4.2 Data Pre-Processing -- 4.3 Experimental Results.
5. Conclusions -- References -- INTERNET CRIME INVESTIGATIONS -- A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS -- 1. Introduction -- 2. Bitcoin System Overview -- 3. Transaction Data Collection -- 4. Graph-Based Bitcoin Transaction Analysis -- 4.1 Address Clustering -- 4.2 Address Graph Observations -- 4.3 Currency Flow Analysis -- 4.4 Mt. Gox Case Study -- 5. Discussion -- 6. Conclusions -- References -- PROFILING AND TRACKING ACYBERLOCKER LINK SHARERIN A PUBLIC WEB FORUM -- 1. Introduction -- 2. Related Work -- 3. Methodology -- 3.1 Data Collection -- 3.2 User Profile Construction -- 3.3 Multidimensional Scaling Analysis -- 3.4 Cluster Analysis -- 4. Experiments -- 4.1 Datasets -- 4.2 Evaluation Metric -- 4.3 Analysis of Sharers -- 4.4 Analysis of Sharers and Followers -- 5. Conclusions -- References -- A PRIVACY-PRESERVING ENCRYPTIONSCHEME FOR AN INTERNET REALNAMEREGISTRATION SYSTEM -- 1. Introduction -- 2. Background -- 2.1 Privacy -- 2.2 Real-Name Registration in South Korea -- 2.3 Real-Name Registration in China -- 3. Real-Name Registration Requirements -- 4. Real-Name Registration Overview -- 5. Privacy-Preserving Real-Name Registration -- 5.1 User Real-Name Registration Process -- 5.2 User Web-Name Registration Process -- 5.3 Privacy-Preserving Properties -- 6. Conclusions -- References -- A LOGIC-BASED NETWORK FORENSICMODEL FOR EVIDENCE ANALYSIS -- 1. Introduction -- 2. Background and Related Work -- 2.1 MulVAL and Logical Attack Graphs -- 2.2 Evidence Graphs -- 2.3 Related Work -- 3. Network Example -- 4. Attack Scenario Reconstruction -- 4.1 Rules and Facts -- 4.2 Evidence Graph Generation -- 5. Extending MulVAL -- 5.1 Using an Anti-Forensic Database -- 5.2 Integrating Evidence Standards -- 6. Experimental Results -- 7. Conclusions -- References -- FORENSIC TECHNIQUES -- CHARACTERISTICS OF MALICIOUSDLLS IN WINDOWS MEMORY.
1. Introduction -- 2. Motivation -- 3. Related Work -- 4. Test Data Generation -- 5. Data Classification -- 6. Injected DLL Characteristics -- 7. Threats to Validity -- 8. Conclusions -- References -- DETERMINING TRIGGERINVOLVEMENT DURING FORENSICATTRIBUTION IN DATABASES -- 1. Introduction -- 2. Background -- 2.1 Forensic Attribution -- 2.2 Triggers -- 3. Trigger Identification -- 4. Algorithm Implementation -- 5. Implementation Challenges -- 5.1 Scope and Visibility -- 5.2 Encryption -- 5.3 Case Sensitivity -- 5.4 False Positive Errors -- 5.5 Data Types -- 5.6 Recursion -- 5.7 Performance -- 6. Conclusions -- References -- USING INTERNAL MySQL/InnoDBB-TREE INDEX NAVIGATION FORDATA HIDING -- 1. Introduction -- 2. Background and Related Work -- 3. InnoDB Index -- 4. Data Removal -- 4.1 Physical Deletion of Data Records -- 4.2 Forensic Impact -- 5. Data Hiding -- 5.1 Manipulating Search Results -- 5.2 Reorganizing the Index -- 5.3 Hiding Data in Index Page Garbage Space -- 5.4 Hiding Data in Index Page Free Space -- 5.5 Removing a Page from the Index -- 6. Conclusions -- References -- IDENTIFYING PASSWORDSSTORED ON DISK -- 1. Introduction -- 2. Related Work -- 3. Background -- 3.1 Probabilistic Context-Free Grammars -- 4. Examining a Disk -- 4.1 Recovering Files from a Disk -- 4.2 Retrieving Tokens from Files -- 4.3 Initial Filtering -- 4.4 Specialized Alpha String Filtering -- 5. Identifying Passwords -- 5.1 Calculating Token Probabilities -- 5.2 Ranking Algorithms -- 6. Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Initial Filtering -- 6.3 Ranking Algorithms -- 6.4 Specialized Filtering -- 7. Conclusions -- References -- FRAGMENTED JPEG FILE RECOVERYUSING PSEUDO HEADERS -- 1. Introduction -- 2. Related Work -- 3. JPEG Background -- 3.1 Essential Configurations in JPEG Headers -- 3.2 Synchronization Point.
4. JPEG File Recovery Methodology -- 4.1 Huffman Table and Sub-Sampling Factor -- 4.2 Image Resolution -- 4.3 Quantization Table -- 5. Experimental Results -- 6. Conclusions -- References -- MOBILE DEVICEFORENSICS -- FORENSIC-READY SECURE iOS APPSFOR JAILBROKEN iPHONES -- 1. Introduction -- 2. Related Work -- 3. Implementation Methodology -- 3.1 Securing Apps -- 3.2 Preserving Dates and Timestamps -- 3.3 Static Library -- 3.4 Dynamic Library -- 4. Preventing Attacks and Anti-Forensics -- 4.1 Using the Static Library -- 4.2 Using the Dynamic Library -- 5. Experimental Results -- 6. Case Study -- 7. Conclusions -- References -- A FRAMEWORK FOR DESCRIBINGMULTIMEDIA CIRCULATION INA SMARTPHONE ECOSYSTEM -- 1. Introduction -- 2. Related Work -- 3. Using Graph Databases -- 4. Use Case Experiments -- 5. Results -- 6. System Design -- 7. Conclusions -- References -- CLOUD FORENSICS -- A TRUSTWORTHY CLOUDFORENSICS ENVIRONMENT -- 1. Introduction -- 2. Related Work -- 3. Desired Properties -- 4. Challenges -- 5. FECloud Architecture -- 5.1 Logger (Themis) -- 5.2 Data Possession Manager (Metis) -- 5.3 Timestamp Manager (Chronos) -- 5.4 Provenance Manager (Clio) -- 5.5 Proof Publisher (Brizo) -- 5.6 Evidence Access Interface (Horizon) -- 5.7 Forensics-Enabled Image -- 5.8 Preliminary Results -- 6. Conclusions -- References -- LOCATING AND TRACKING DIGITALOBJECTS IN THE CLOUD -- 1. Introduction -- 2. Background -- 2.1 Cloud Computing -- 2.2 Digital Forensics -- 2.3 Data Provenance -- 3. Related Work -- 3.1 Storing Provenance Data -- 3.2 Data Provenance Requirements -- 4. Cloud-Based Provenance Model -- 5. Using a Central Logging Server -- 5.1 File Wrapper -- 5.2 Tracking Wrapper Locations -- 6. Discussion -- 7. Conclusions -- References -- FORENSIC TOOLS -- A TOOL FOR EXTRACTING STATIC ANDVOLATILE FORENSIC ARTIFACTS OFWINDOWS 8.x APPS -- 1. Introduction.
2. Related Work -- 2.1 Windows 8 Forensics -- 2.2 Forensic Analysis of Apps -- 3. Background -- 3.1 Hibernation File -- 3.2 Swap File -- 3.3 Static vs. Volatile Artifacts -- 4. Experimental Methodology -- 5. Experimental Results -- 5.1 Facebook -- 5.2 Other Apps -- 5.3 Performance -- 6. Conclusions -- References -- CRITERIA FOR VALIDATINGSECURE WIPING TOOLS -- 1. Introduction -- 2. Deletion Effects and Deletion Types -- 2.1 Deletion Effects -- 2.2 Deletion Types -- 3. File Deletion Artifacts -- 3.1 MFT Records (Recycle Bin Deletion) -- 3.2 LogFile (Recycle Bin Deletion) -- 3.3 Hard Disk (Recycle Bin Deletion) -- 3.4 MFT Records (Permanent File Deletion) -- 3.5 LogFile (Permanent File Deletion) -- 3.6 Hard Disk (Permanent File Deletion) -- 4. Validation Criteria -- 4.1 Specifications -- 4.2 Test Assertions -- 4.3 Test Cases (SW-TC) -- 4.4 Relational Summary Table -- 5. Validation Testing of Eraser -- 6. Conclusions -- References -- DO DATA LOSS PREVENTIONSYSTEMS REALLY WORK? -- 1. Introduction -- 2. Related Work -- 3. Evaluated Systems -- 3.1 Agent-Based Solution -- 3.2 Agentless Solution -- 3.3 Hybrid Solution -- 3.4 File System Scanning Tool -- 4. Experimental Setup -- 5. Experimental Results -- 6. Discussion -- 7. Conclusions -- References.
Record Nr. UNINA-9910299205603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XII : 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XII : 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVIII, 396 p. 99 illus.)
Disciplina 363.25
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Electronic commerce
Information technology - Management
Cryptography
Data encryption (Computer science)
Data and Information Security
Computers and Society
e-Commerce and e-Business
Computer Application in Administrative Data Processing
Cryptology
ISBN 3-319-46279-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910254985803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Marketing and eCommerce : Fifth International Conference, 2024 / / edited by Francisco J. Martínez-López, Luis F. Martinez, Philipp Brüggemann
Advances in Digital Marketing and eCommerce : Fifth International Conference, 2024 / / edited by Francisco J. Martínez-López, Luis F. Martinez, Philipp Brüggemann
Autore Martínez-López Francisco J
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (327 pages)
Disciplina 658.872
659.144
Altri autori (Persone) MartinezLuis F
BrüggemannPhilipp
Collana Springer Proceedings in Business and Economics
Soggetto topico Telemarketing
Internet marketing
Business information services
Electronic commerce
Digital Marketing
IT in Business
e-Commerce and e-Business
ISBN 9783031621352
9783031621345
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Negative WOM for Liking Brands vs Positive WOM for Disliking Brands: Differences in Length and Content of WOM -- The impact of 3D digital content on consumer satisfaction with brand experiences -- Love Me, Love Me Not: The Counterintuitive Relationships in Social Networking Sites.
Record Nr. UNINA-9910866572103321
Martínez-López Francisco J  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Edizione [1st ed. 2002.]
Pubbl/distr/stampa New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (218 p.)
Disciplina 005.8
Altri autori (Persone) DeckerBart de <1958->
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer science
Microprocessors
Computer architecture
Computer networks
Electronic commerce
Electronic data processing - Management
Theory of Computation
Processor Architectures
Computer Communication Networks
e-Commerce and e-Business
IT Operations
ISBN 1-280-20490-7
9786610204908
0-306-46958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification.
Record Nr. UNINA-9910780042403321
New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui