Surveillance in Action [[electronic resource] ] : Technologies for Civilian, Military and Cyber Surveillance / / edited by Panagiotis Karampelas, Thirimachos Bourlai |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIV, 412 p. 149 illus., 128 illus. in color.) |
Disciplina | 621.38928 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Politics and war
Computer crimes Pattern recognition Biometrics (Biology) System safety Military and Defence Studies Cybercrime Pattern Recognition Biometrics Security Science and Technology |
ISBN | 3-319-68533-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I – Surveillance of Human Features -- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition -- Comparative Face Soft Biometrics for Human Identification -- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition -- A Study on Human Recognition using Auricle and Side View Face Images -- Cross-spectral Iris Matching for Surveillance Applications -- Facial Surveillance and Recognition in the Passive Infrared Bands -- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band -- Part II – Surveillance for Security and Defense -- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites -- Drones Surveillance - Challenges and Techniques -- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance -- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents -- Social Networks for Surveillance and Security: ‘Using Online Techniques to make something happen in the real or cyber world’ -- Surveillance, targeted killing and the fight against Terrorism: a fair-played game -- Part III – Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics -- Methods to Detect Cyber threats on Twitter -- Detecting Users Who Share Extremist Content on Twitter -- An Organizational Visualization Profiler Tool Based on Social Interactions -- Cyber-Surveillance Analysis for Supercomputing Environments. |
Record Nr. | UNINA-9910300526803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Sweetie 2.0 [[electronic resource] ] : Using Artificial Intelligence to Fight Webcam Child Sex Tourism / / edited by Simone van der Hof, Ilina Georgieva, Bart Schermer, Bert-Jaap Koops |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | The Hague : , : T.M.C. Asser Press : , : Imprint : T.M.C. Asser Press, , 2019 |
Descrizione fisica | 1 online resource (556 pages) |
Disciplina | 004.678083 |
Collana | Information Technology and Law Series |
Soggetto topico |
International criminal law
Computer crimes Big data Application software International Criminal Law Cybercrime Big Data/Analytics Information Systems Applications (incl. Internet) |
ISBN | 94-6265-288-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Legal Aspects of Sweetie 2.0 -- Chapter 2. Sexual-Orientated Online Chat Conversations - Characteristics and Testing Pathways -- Chapter 3. Sweetie 2.0 Technology: Technical Challenges of Making the Sweetie 2.0 Chatbot -- Chapter 4. Substantive and Procedural Legislation in Australia to Combat Webcam-Related Child Sexual Abuse -- Chapter 5. Substantive and Procedural Legislation in Belgium to Combat Webcam-Related Sexual Child Abuse -- Chapter 6. Substantive and Procedural Legislation in the Republic of Croatia to Combat Webcam-Related Child Sexual Abuse -- Chapter 7. Substantive and Procedural Legislation in England and Wales to Combat Webcam-Related Child Sexual Abuse -- Chapter 8. Substantive and Procedural Legislation in Estonia to Combat Webcam-Related Child Sexual Abuse -- Chapter 9. Substantive and Procedural Legislation in Israel to Combat Webcam-Related Child Sexual Abuse -- Chapter 10. Substantive and Procedural Legislation in the Netherlands to Combat Webcam-Related Child Sexual Abuse -- Chapter 11. Substantive and Procedural Legislation in the Philippines to Combat Webcam-Related Child Sexual Abuse -- Chapter 12. Substantive and Procedural Legislation in United States of America to Combat Webcam-Related Child Sexual Abuse. |
Record Nr. | UNINA-9910349378903321 |
The Hague : , : T.M.C. Asser Press : , : Imprint : T.M.C. Asser Press, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Technology and the Intelligence Community [[electronic resource] ] : Challenges and Advances for the 21st Century / / edited by Margaret E. Kosal |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (288 pages) |
Disciplina | 327.1273 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Security, International
System safety Computer security Technology—Sociological aspects Computer crimes International Security Studies Security Science and Technology Systems and Data Security Science and Technology Studies Cybercrime |
ISBN | 3-319-75232-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Acknowledgements -- Introduction -- Interaction of Technology and Organization: Case Study of US Military COMINT in World War II -- Intelligence Innovation: Sputnik, the Soviet Threat, and Innovation in the US Intelligence Community -- Organizational Process, Leadership, and Technology for Intelligence Gathering: Development of Photo-Reconnaissance Satellites in the United States -- Exploring the Contributing Factors Associated with Intelligence Failures During the Cold War -- The Dragon Lady and the Beast of Kandahar: Bush and Obama-era US aerial drone surveillance policy based on a case study comparison of the 1960 U-2 crash with the 2011 RQ-170 crash. Wiretapping: The Interaction of Policy and Technology -- Nuclear Counterproliferation Intelligence -- Organizational Legitimacy and Open Source Intelligence -- Strategic Offensive Cyber Operations: Capabilities, Limitations, and Role of the Intelligence Community -- Promise and Perils of Big Data Science for Intelligence Community -- Situational Awareness in Megacities -- Augmenting Intelligence: What Augmented Reality Technology Means for the Intelligence Community -- Analyzing Public and State Reactions to Global Surveillance Disclosures: Using Ethical Frameworks to Gain Understanding -- Conclusions. |
Record Nr. | UNINA-9910300498903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Technology in human smuggling and trafficking : case studies from Italy and the United Kingdom / / by Georgios A. Antonopoulos, Gabriele Baratto, Andrea Di Nicola, Parisa Diba, Elisa Martini, Georgios Papanicolaou, Fiamma Terenghi |
Autore | Antonopoulos Georgios A |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (79 pages) |
Disciplina | 306.362 |
Collana | SpringerBriefs in Criminology |
Soggetto topico |
Transnational crime
Computer crimes Trafficking Cybercrime |
ISBN | 3-030-42768-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction -- 2. The role of the internet and digital technologies in human smuggling and trafficking in Italy -- 3. The role of the internet and digital technologies in human smuggling and trafficking in the United Kingdom -- 4. Conclusion: human smuggling, human trafficking and the role of communication technologies. |
Record Nr. | UNINA-9910410030603321 |
Antonopoulos Georgios A | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Technology-Enhanced Methods of Money Laundering [[electronic resource] ] : Internet As Criminal Means / / by Fausto Martin De Sanctis |
Autore | De Sanctis Fausto Martin |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (181 pages) |
Disciplina | 364.168 |
Soggetto topico |
Computer crimes
Organized crime Cybercrime Organized Crime |
ISBN | 3-030-18330-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction -- 2. Dark Web: Deterring Cybercrimes and Cyber-Attack -- 3. Online Gaming: Casino, Lotteries, and Gambling -- 4. Payments Through Illegal and Disguised Means -- 5. Online Sales -- 6. Social Media -- 7. Tax Misapplication: Sales and Use Taxes and Games Taxation -- 8. International Legal Cooperation, Confiscation/Repatriation of Assets and Virtual World -- 9. Conclusions -- 10. Proposals to Improve the Efforts Against Online Crimes (Money Laundering). |
Record Nr. | UNINA-9910337825903321 |
De Sanctis Fausto Martin | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
What is to Be Done About Crime and Punishment? [[electronic resource] ] : Towards a 'Public Criminology' / / edited by Roger Matthews |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2016 |
Descrizione fisica | 1 online resource (XV, 324 p.) |
Disciplina | 364.01 |
Soggetto topico |
Criminology
Critical criminology Crime—Sociological aspects Computer crimes Organized crime Corrections Punishment Criminological Theory Critical Criminology Crime and Society Cybercrime Organized Crime Prison and Punishment |
ISBN | 1-137-57228-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction: Towards a Public Criminology; Roger Matthews -- Chapter 2. The Violence Divide: Taking 'Ordinary' Crime Seriously in a Volatile World; Elliott Currie -- Chapter 3. Domestic Violence: The Increasing Tensions Between Experience, Theory, Research, Policy and Practice; Nicole Westmarland and Liz Kelly -- Chapter 4. Critical Realism and Gang Violence; John Pitts -- Chapter 5. Middle Range Critical Realism for Crime Prevention; Nick Tilley -- Chapter 6. Policing; Past, Present and Future; Ben Bowling, Shruti Iyer, Robert Reiner and James Sheptycki -- Chapter 7. Seven Ways to Make Prisons Work; Francis Cullen, Cheryl Jonson, Daniel Mears and Angela Thielo -- Chapter 8. Five Steps Towards a More Effective Global Drugs Policy; Caroline Chatwin -- Chapter 9. Taming Business? Understanding Effectiveness in the Control of Corporate and White Collar Crime; Fiona Haines -- Chapter 10. Cybercrime 4.0: Now What is to be Done?; Mike McGuire -- Chapter 11. Addressing Prostitution: The Nordic Model and Beyond; Helen Johnson and Roger Matthews. |
Record Nr. | UNINA-9910253352303321 |
London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
When Jihadi Ideology Meets Social Media [[electronic resource] /] / by Jamil Ammar, Songhua Xu |
Autore | Ammar Jamil |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018 |
Descrizione fisica | 1 online resource (XXIII, 147 p. 29 illus.) |
Disciplina | 320.956 |
Soggetto topico |
Middle East—Politics and government
Political communication Religion and politics Culture Technology Social media Computer crimes Middle Eastern Politics Political Communication Politics and Religion Culture and Technology Social Media Cybercrime |
ISBN | 3-319-60116-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1: Who Speaks for Islam? Extreme Religious Groups, the Exception that Proves the Rule -- 2: The Rise of Religious Extremism in the Middle East: A Triptych View? -- 3: Extreme Groups and the Militarization of Social Media -- 4: Extreme Groups Propaganda War under a Free Speech Lens: The Unwinnable Battle -- 5: Technology to the Rescue: A Software-Based Approach to Tackle Extreme Speech. . |
Record Nr. | UNINA-9910300520503321 |
Ammar Jamil | ||
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless Networks [[electronic resource] ] : Cyber Security Threats and Countermeasures / / edited by Hamid Jahankhani, Ayman El Hajjar |
Autore | Jahankhani Hamid |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (352 pages) |
Disciplina | 005.8 |
Altri autori (Persone) | El HajjarAyman |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Data protection
Computer networks - Security measures Wireless communication systems Mobile communication systems Computer crimes Data and Information Security Mobile and Network Security Wireless and Mobile Communication Cybercrime |
ISBN | 3-031-33631-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Key-Pre Distribution for the Internet of Things -- 2. Approaches and Methods for Regulation of Security Risks in 5G and 6G -- 3. Investigating Gesture Control of Smart Cities -- 4. Safety And Security Issues in Employing Drones -- 5. Security Threats of Unmanned Aerial Vehicles -- 6. A Machine Learning Based Approach to Detect Cyber-Attacks on Connected and Autonomous Vehicles (CAVs) -- 7. Security and Privacy Concerns in Next-Generation Networks using Artificial Intelligence-based Solutions: A Potential Use Case -- 8. A Blockchain-enabled Approach for Secure Data Sharing in 6G-based Internet of Things Networks. |
Record Nr. | UNINA-9910742497903321 |
Jahankhani Hamid | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|