top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Surveillance in Action [[electronic resource] ] : Technologies for Civilian, Military and Cyber Surveillance / / edited by Panagiotis Karampelas, Thirimachos Bourlai
Surveillance in Action [[electronic resource] ] : Technologies for Civilian, Military and Cyber Surveillance / / edited by Panagiotis Karampelas, Thirimachos Bourlai
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIV, 412 p. 149 illus., 128 illus. in color.)
Disciplina 621.38928
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Politics and war
Computer crimes
Pattern recognition
Biometrics (Biology)
System safety
Military and Defence Studies
Cybercrime
Pattern Recognition
Biometrics
Security Science and Technology
ISBN 3-319-68533-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I – Surveillance of Human Features -- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition -- Comparative Face Soft Biometrics for Human Identification -- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition -- A Study on Human Recognition using Auricle and Side View Face Images -- Cross-spectral Iris Matching for Surveillance Applications -- Facial Surveillance and Recognition in the Passive Infrared Bands -- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band -- Part II – Surveillance for Security and Defense -- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites -- Drones Surveillance - Challenges and Techniques -- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance -- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents -- Social Networks for Surveillance and Security: ‘Using Online Techniques to make something happen in the real or cyber world’ -- Surveillance, targeted killing and the fight against Terrorism: a fair-played game -- Part III – Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics -- Methods to Detect Cyber threats on Twitter -- Detecting Users Who Share Extremist Content on Twitter -- An Organizational Visualization Profiler Tool Based on Social Interactions -- Cyber-Surveillance Analysis for Supercomputing Environments.
Record Nr. UNINA-9910300526803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Sweetie 2.0 [[electronic resource] ] : Using Artificial Intelligence to Fight Webcam Child Sex Tourism / / edited by Simone van der Hof, Ilina Georgieva, Bart Schermer, Bert-Jaap Koops
Sweetie 2.0 [[electronic resource] ] : Using Artificial Intelligence to Fight Webcam Child Sex Tourism / / edited by Simone van der Hof, Ilina Georgieva, Bart Schermer, Bert-Jaap Koops
Edizione [1st ed. 2019.]
Pubbl/distr/stampa The Hague : , : T.M.C. Asser Press : , : Imprint : T.M.C. Asser Press, , 2019
Descrizione fisica 1 online resource (556 pages)
Disciplina 004.678083
Collana Information Technology and Law Series
Soggetto topico International criminal law
Computer crimes
Big data
Application software
International Criminal Law
Cybercrime
Big Data/Analytics
Information Systems Applications (incl. Internet)
ISBN 94-6265-288-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Legal Aspects of Sweetie 2.0 -- Chapter 2. Sexual-Orientated Online Chat Conversations - Characteristics and Testing Pathways -- Chapter 3. Sweetie 2.0 Technology: Technical Challenges of Making the Sweetie 2.0 Chatbot -- Chapter 4. Substantive and Procedural Legislation in Australia to Combat Webcam-Related Child Sexual Abuse -- Chapter 5. Substantive and Procedural Legislation in Belgium to Combat Webcam-Related Sexual Child Abuse -- Chapter 6. Substantive and Procedural Legislation in the Republic of Croatia to Combat Webcam-Related Child Sexual Abuse -- Chapter 7. Substantive and Procedural Legislation in England and Wales to Combat Webcam-Related Child Sexual Abuse -- Chapter 8. Substantive and Procedural Legislation in Estonia to Combat Webcam-Related Child Sexual Abuse -- Chapter 9. Substantive and Procedural Legislation in Israel to Combat Webcam-Related Child Sexual Abuse -- Chapter 10. Substantive and Procedural Legislation in the Netherlands to Combat Webcam-Related Child Sexual Abuse -- Chapter 11. Substantive and Procedural Legislation in the Philippines to Combat Webcam-Related Child Sexual Abuse -- Chapter 12. Substantive and Procedural Legislation in United States of America to Combat Webcam-Related Child Sexual Abuse.
Record Nr. UNINA-9910349378903321
The Hague : , : T.M.C. Asser Press : , : Imprint : T.M.C. Asser Press, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Technology and the Intelligence Community [[electronic resource] ] : Challenges and Advances for the 21st Century / / edited by Margaret E. Kosal
Technology and the Intelligence Community [[electronic resource] ] : Challenges and Advances for the 21st Century / / edited by Margaret E. Kosal
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (288 pages)
Disciplina 327.1273
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Security, International
System safety
Computer security
Technology—Sociological aspects
Computer crimes
International Security Studies
Security Science and Technology
Systems and Data Security
Science and Technology Studies
Cybercrime
ISBN 3-319-75232-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Acknowledgements -- Introduction -- Interaction of Technology and Organization: Case Study of US Military COMINT in World War II -- Intelligence Innovation: Sputnik, the Soviet Threat, and Innovation in the US Intelligence Community -- Organizational Process, Leadership, and Technology for Intelligence Gathering: Development of Photo-Reconnaissance Satellites in the United States -- Exploring the Contributing Factors Associated with Intelligence Failures During the Cold War -- The Dragon Lady and the Beast of Kandahar: Bush and Obama-era US aerial drone surveillance policy based on a case study comparison of the 1960 U-2 crash with the 2011 RQ-170 crash. Wiretapping: The Interaction of Policy and Technology -- Nuclear Counterproliferation Intelligence -- Organizational Legitimacy and Open Source Intelligence -- Strategic Offensive Cyber Operations: Capabilities, Limitations, and Role of the Intelligence Community -- Promise and Perils of Big Data Science for Intelligence Community -- Situational Awareness in Megacities -- Augmenting Intelligence:  What Augmented Reality Technology Means for the Intelligence Community -- Analyzing Public and State Reactions to Global Surveillance Disclosures:  Using Ethical Frameworks to Gain Understanding -- Conclusions.
Record Nr. UNINA-9910300498903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Technology in human smuggling and trafficking : case studies from Italy and the United Kingdom / / by Georgios A. Antonopoulos, Gabriele Baratto, Andrea Di Nicola, Parisa Diba, Elisa Martini, Georgios Papanicolaou, Fiamma Terenghi
Technology in human smuggling and trafficking : case studies from Italy and the United Kingdom / / by Georgios A. Antonopoulos, Gabriele Baratto, Andrea Di Nicola, Parisa Diba, Elisa Martini, Georgios Papanicolaou, Fiamma Terenghi
Autore Antonopoulos Georgios A
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (79 pages)
Disciplina 306.362
Collana SpringerBriefs in Criminology
Soggetto topico Transnational crime
Computer crimes
Trafficking
Cybercrime
ISBN 3-030-42768-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- 2. The role of the internet and digital technologies in human smuggling and trafficking in Italy -- 3. The role of the internet and digital technologies in human smuggling and trafficking in the United Kingdom -- 4. Conclusion: human smuggling, human trafficking and the role of communication technologies.
Record Nr. UNINA-9910410030603321
Antonopoulos Georgios A  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Technology-Enhanced Methods of Money Laundering [[electronic resource] ] : Internet As Criminal Means / / by Fausto Martin De Sanctis
Technology-Enhanced Methods of Money Laundering [[electronic resource] ] : Internet As Criminal Means / / by Fausto Martin De Sanctis
Autore De Sanctis Fausto Martin
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (181 pages)
Disciplina 364.168
Soggetto topico Computer crimes
Organized crime
Cybercrime
Organized Crime
ISBN 3-030-18330-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- 2. Dark Web: Deterring Cybercrimes and Cyber-Attack -- 3. Online Gaming: Casino, Lotteries, and Gambling -- 4. Payments Through Illegal and Disguised Means -- 5. Online Sales -- 6. Social Media -- 7. Tax Misapplication: Sales and Use Taxes and Games Taxation -- 8. International Legal Cooperation, Confiscation/Repatriation of Assets and Virtual World -- 9. Conclusions -- 10. Proposals to Improve the Efforts Against Online Crimes (Money Laundering).
Record Nr. UNINA-9910337825903321
De Sanctis Fausto Martin  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
What is to Be Done About Crime and Punishment? [[electronic resource] ] : Towards a 'Public Criminology' / / edited by Roger Matthews
What is to Be Done About Crime and Punishment? [[electronic resource] ] : Towards a 'Public Criminology' / / edited by Roger Matthews
Edizione [1st ed. 2016.]
Pubbl/distr/stampa London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2016
Descrizione fisica 1 online resource (XV, 324 p.)
Disciplina 364.01
Soggetto topico Criminology
Critical criminology
Crime—Sociological aspects
Computer crimes
Organized crime
Corrections
Punishment
Criminological Theory
Critical Criminology
Crime and Society
Cybercrime
Organized Crime
Prison and Punishment
ISBN 1-137-57228-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction: Towards a Public Criminology; Roger Matthews -- Chapter 2. The Violence Divide: Taking 'Ordinary' Crime Seriously in a Volatile World; Elliott Currie -- Chapter 3. Domestic Violence: The Increasing Tensions Between Experience, Theory, Research, Policy and Practice; Nicole Westmarland and Liz Kelly -- Chapter 4. Critical Realism and Gang Violence; John Pitts -- Chapter 5. Middle Range Critical Realism for Crime Prevention; Nick Tilley -- Chapter 6. Policing; Past, Present and Future; Ben Bowling, Shruti Iyer, Robert Reiner and James Sheptycki -- Chapter 7. Seven Ways to Make Prisons Work; Francis Cullen, Cheryl Jonson, Daniel Mears and Angela Thielo -- Chapter 8. Five Steps Towards a More Effective Global Drugs Policy; Caroline Chatwin -- Chapter 9. Taming Business? Understanding Effectiveness in the Control of Corporate and White Collar Crime; Fiona Haines -- Chapter 10. Cybercrime 4.0: Now What is to be Done?; Mike McGuire -- Chapter 11. Addressing Prostitution: The Nordic Model and Beyond; Helen Johnson and Roger Matthews.
Record Nr. UNINA-9910253352303321
London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
When Jihadi Ideology Meets Social Media [[electronic resource] /] / by Jamil Ammar, Songhua Xu
When Jihadi Ideology Meets Social Media [[electronic resource] /] / by Jamil Ammar, Songhua Xu
Autore Ammar Jamil
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018
Descrizione fisica 1 online resource (XXIII, 147 p. 29 illus.)
Disciplina 320.956
Soggetto topico Middle East—Politics and government
Political communication
Religion and politics
Culture
Technology
Social media
Computer crimes
Middle Eastern Politics
Political Communication
Politics and Religion
Culture and Technology
Social Media
Cybercrime
ISBN 3-319-60116-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1: Who Speaks for Islam? Extreme Religious Groups, the Exception that Proves the Rule -- 2: The Rise of Religious Extremism in the Middle East: A Triptych View? -- 3: Extreme Groups and the Militarization of Social Media -- 4: Extreme Groups Propaganda War under a Free Speech Lens: The Unwinnable Battle -- 5: Technology to the Rescue: A Software-Based Approach to Tackle Extreme Speech. .
Record Nr. UNINA-9910300520503321
Ammar Jamil  
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Networks [[electronic resource] ] : Cyber Security Threats and Countermeasures / / edited by Hamid Jahankhani, Ayman El Hajjar
Wireless Networks [[electronic resource] ] : Cyber Security Threats and Countermeasures / / edited by Hamid Jahankhani, Ayman El Hajjar
Autore Jahankhani Hamid
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (352 pages)
Disciplina 005.8
Altri autori (Persone) El HajjarAyman
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Computer networks - Security measures
Wireless communication systems
Mobile communication systems
Computer crimes
Data and Information Security
Mobile and Network Security
Wireless and Mobile Communication
Cybercrime
ISBN 3-031-33631-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Key-Pre Distribution for the Internet of Things -- 2. Approaches and Methods for Regulation of Security Risks in 5G and 6G -- 3. Investigating Gesture Control of Smart Cities -- 4. Safety And Security Issues in Employing Drones -- 5. Security Threats of Unmanned Aerial Vehicles -- 6. A Machine Learning Based Approach to Detect Cyber-Attacks on Connected and Autonomous Vehicles (CAVs) -- 7. Security and Privacy Concerns in Next-Generation Networks using Artificial Intelligence-based Solutions: A Potential Use Case -- 8. A Blockchain-enabled Approach for Secure Data Sharing in 6G-based Internet of Things Networks.
Record Nr. UNINA-9910742497903321
Jahankhani Hamid  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui