top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
Autore Alrabaee Saed
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XXI, 247 p. 77 illus., 31 illus. in color.)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Data protection
Biometrics (Biology)
Computer crimes
Security
Biometrics
Cybercrime
ISBN 3-030-34238-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion.
Record Nr. UNISA-996465453903316
Alrabaee Saed  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Building a Cybersecurity Culture in Organizations [[electronic resource] ] : How to Bridge the Gap Between People and Digital Technology / / by Isabella Corradini
Building a Cybersecurity Culture in Organizations [[electronic resource] ] : How to Bridge the Gap Between People and Digital Technology / / by Isabella Corradini
Autore Corradini Isabella
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (144 pages)
Disciplina 005.8
Collana Studies in Systems, Decision and Control
Soggetto topico Quality control
Reliability
Industrial safety
Industrial psychology
Employee health promotion
Computer crimes
Quality Control, Reliability, Safety and Risk
Industrial and Organizational Psychology
Employee Health and Wellbeing
Cybercrime
ISBN 3-030-43999-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- The scenario -- Security: Human nature and behavior -- Redefining the approach to cybersecurity -- Building Cybersecurity Culture -- Communication is not optional -- Developing cybersecurity awareness -- Training methods -- Conclusions.
Record Nr. UNINA-9910392740103321
Corradini Isabella  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bullying and Violence in South Korea [[electronic resource] ] : From Home to School and Beyond / / by Trent Bax
Bullying and Violence in South Korea [[electronic resource] ] : From Home to School and Beyond / / by Trent Bax
Autore Bax Trent
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2016
Descrizione fisica 1 online resource (394 pages) : illustrations, tables
Disciplina 371.58
Collana Palgrave Advances in Criminology and Criminal Justice in Asia
Soggetto topico Critical criminology
Crime—Sociological aspects
Transnational crime
Computer crimes
Juvenile delinquents
Critical Criminology
Crime and Society
Transnational Crime
Cybercrime
Youth Offending and Juvenile Justice
ISBN 3-319-44612-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction - South Korea’s Young, How Are You Doing? -- Chapter 2. The Initial Spark - A Contemporary History of School Violence -- Chapter 3. The Fuel - Consumer Culture, Exclusion, Ethics & Idols -- Chapter 4. The Fire - Bullying & Violence by Adults at Work -- Chapter 5. The Explosion - Political & Personal Reactions to School Violence.
Record Nr. UNINA-9910735388003321
Bax Trent  
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Collaborative Approaches for Cyber Security in Cyber-Physical Systems [[electronic resource] /] / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli
Collaborative Approaches for Cyber Security in Cyber-Physical Systems [[electronic resource] /] / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XII, 226 p. 65 illus., 48 illus. in color.)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Computer crimes
Business information services
Security systems
Data and Information Security
Cybercrime
IT in Business
Security Science and Technology
ISBN 3-031-16088-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Collaborative and confidential architectures for information sharing and analytics -- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware -- 3. Virtualized security-awareness systems and digital twins -- 4. Empirical evaluation of system vulnerabilities -- 5. Collaborative physical and cyber defense requirements -- 6. Heterogeneous data centric security policies specification and enforcement -- 7. Big data for anomaly and advanced threats detection -- 8. Collaborative identification and ranking of malware -- 9. Visual analytics techniques for cyber security -- 10. Collaborative mitigation methodologies against advanced and persistent attacks.
Record Nr. UNINA-9910639892803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Collaborative Approaches for Cyber Security in Cyber-Physical Systems [[electronic resource] /] / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli
Collaborative Approaches for Cyber Security in Cyber-Physical Systems [[electronic resource] /] / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XII, 226 p. 65 illus., 48 illus. in color.)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Computer crimes
Business information services
Security systems
Data and Information Security
Cybercrime
IT in Business
Security Science and Technology
ISBN 3-031-16088-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Collaborative and confidential architectures for information sharing and analytics -- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware -- 3. Virtualized security-awareness systems and digital twins -- 4. Empirical evaluation of system vulnerabilities -- 5. Collaborative physical and cyber defense requirements -- 6. Heterogeneous data centric security policies specification and enforcement -- 7. Big data for anomaly and advanced threats detection -- 8. Collaborative identification and ranking of malware -- 9. Visual analytics techniques for cyber security -- 10. Collaborative mitigation methodologies against advanced and persistent attacks.
Record Nr. UNISA-996547960403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Combatting Cybercrime and Cyberterrorism [[electronic resource] ] : Challenges, Trends and Priorities / / edited by Babak Akhgar, Ben Brewster
Combatting Cybercrime and Cyberterrorism [[electronic resource] ] : Challenges, Trends and Priorities / / edited by Babak Akhgar, Ben Brewster
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 323 p. 36 illus.)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer crimes
Computer security
System safety
Cybercrime
Systems and Data Security
Security Science and Technology
ISBN 3-319-38930-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1- Approaching Cybercrime and Cyberterrorism Research -- Part 2- Legal, Ethical and Privacy Considerations -- Part 3- Technologies, Scenarios and Best Practices -- Part 4- Policy Development and Roadmaps for CC/CT Research.
Record Nr. UNINA-9910253308803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Contemporary Sex Offender Risk Management, Volume I [[electronic resource] ] : Perceptions / / edited by Kieran McCartan, Hazel Kemshall
Contemporary Sex Offender Risk Management, Volume I [[electronic resource] ] : Perceptions / / edited by Kieran McCartan, Hazel Kemshall
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017
Descrizione fisica 1 online resource (XIX, 235 p. 11 illus., 7 illus. in color.)
Disciplina 364.9
Collana Palgrave Studies in Risk, Crime and Society
Soggetto topico Sex crimes
Crime—Sociological aspects
Public safety
Corrections
Punishment
Computer crimes
Sexual Offending
Crime and Society
Crime Control and Security
Prison and Punishment
Cybercrime
ISBN 3-319-63567-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Historical Evolution of Sex Offender Risk Management; Hazel Kemshall -- 2. Public Health, Prevention and Risk Management; Jon Brown -- 3. Public Education, Prevention and Risk Management; Joan Tabachnick, Kieran Mccartan -- 4. Preventive Sentencing; Nicola Padfield -- 5. “An Exceptional Sentence”; Yvonne Gailey, Lesley Martin, Rachel Webb -- 6. Panic or Placebo?; Andy Williams -- 7. Building and Sustaining a Resilient Workforce; Lydia Guthrie -- 8. The Third Sector Role in Managing Serious Offenders; Mary S Corcoran, Sam Weston.
Record Nr. UNINA-9910255262403321
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Contemporary Sex Offender Risk Management, Volume II [[electronic resource] ] : Responses / / edited by Hazel Kemshall, Kieran McCartan
Contemporary Sex Offender Risk Management, Volume II [[electronic resource] ] : Responses / / edited by Hazel Kemshall, Kieran McCartan
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017
Descrizione fisica 1 online resource (XVII, 233 p. 9 illus., 4 illus. in color.)
Disciplina 364.168
Collana Palgrave Studies in Risk, Crime and Society
Soggetto topico Sex crimes
Crime—Sociological aspects
Public safety
Corrections
Punishment
Computer crimes
Sexual Offending
Crime and Society
Crime Control and Security
Prison and Punishment
Cybercrime
ISBN 3-319-63573-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Behavioural Crime Linkage And Multi-Agency Working; Leah. Ashmore-Hills, Amy. Burrell, Matthew Tonkin -- 2. Assessment Of Risk To Sexually Reoffend; Robin Wilson, Jeffrey C. Sandler -- 3. Critical Reflections On The Risk-Based Prevention Of Sexual Offending By Young People; Stephen Case -- 4. Managing Sexual And Violent Offenders Across Eu Borders; Sarah Hilder -- 5. Online Sex Offending And Risk Management; Maggie Brennan, Hannah Merdian, Derek Perkins -- 6. Risk Management Of Youth Who Sexually Offend; Gerald Zeng, Chu Chi Meng -- 7. Desistance From Sexual Offending And Risk Management; Joanne Hulley -- 8. Reframing The Sex Offender Register And Disclosure; Kieran Mccartan, Hazel Kemshall, James Hoggett.
Record Nr. UNINA-9910255268803321
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Countering Cyber Threats to Financial Institutions [[electronic resource] ] : A Private and Public Partnership Approach to Critical Infrastructure Protection / / by Pierre-Luc Pomerleau, David L. Lowery
Countering Cyber Threats to Financial Institutions [[electronic resource] ] : A Private and Public Partnership Approach to Critical Infrastructure Protection / / by Pierre-Luc Pomerleau, David L. Lowery
Autore Pomerleau Pierre-Luc
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020
Descrizione fisica 1 online resource (237 pages)
Disciplina 332.10684
Soggetto topico Risk management
Bank marketing
Computer crimes
Financial engineering
Finance, Public
Risk Management
Financial Services
Cybercrime
Financial Engineering
Public Finance
ISBN 3-030-54054-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Contemporary Cybersecurity in Our Daily Lives -- Chapter 2: Relevance of Evidence Based Cybersecurity in Guiding the Financial Sector’s & Efforts in Fighting Cybercrime -- Chapter 3: The Evolution of Cybersecurity within the American Financial Sector -- Chapter 4: The Evolution of the Threats to Canadian Financial Institutions, the Actual State of Public and Private Partnerships in Canada -- Chapter 5: Major Themes in the Literature of Cybersecurity and Public-Private Partnerships; A Focus on Financial Institutions -- Chapter 6: Research Findings; Contemporary Perceptions of Canadian Security Professionals Regarding the Challenges in Sharing Information with the Public Sector -- Chapter 7: Conclusions and Implications for Practice and Future Studies on Public-Private Partnerships.
Record Nr. UNINA-9910416128603321
Pomerleau Pierre-Luc  
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Countering Cyberterrorism [[electronic resource] ] : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari
Countering Cyberterrorism [[electronic resource] ] : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari
Autore Montasari Reza
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (175 pages)
Disciplina 060
Collana Advances in Information Security
Soggetto topico Computer networks—Security measures
Artificial intelligence
Computer crimes
Mobile and Network Security
Artificial Intelligence
Cybercrime
ISBN 9783031219207
9783031219191
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Government’s Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- Chilling Effect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. .
Record Nr. UNINA-9910637731903321
Montasari Reza  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui