Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna |
Autore | Alrabaee Saed |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XXI, 247 p. 77 illus., 31 illus. in color.) |
Disciplina | 005.8 |
Collana | Advances in Information Security |
Soggetto topico |
Data protection
Biometrics (Biology) Computer crimes Security Biometrics Cybercrime |
ISBN | 3-030-34238-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion. |
Record Nr. | UNISA-996465453903316 |
Alrabaee Saed | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Building a Cybersecurity Culture in Organizations [[electronic resource] ] : How to Bridge the Gap Between People and Digital Technology / / by Isabella Corradini |
Autore | Corradini Isabella |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (144 pages) |
Disciplina | 005.8 |
Collana | Studies in Systems, Decision and Control |
Soggetto topico |
Quality control
Reliability Industrial safety Industrial psychology Employee health promotion Computer crimes Quality Control, Reliability, Safety and Risk Industrial and Organizational Psychology Employee Health and Wellbeing Cybercrime |
ISBN | 3-030-43999-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- The scenario -- Security: Human nature and behavior -- Redefining the approach to cybersecurity -- Building Cybersecurity Culture -- Communication is not optional -- Developing cybersecurity awareness -- Training methods -- Conclusions. |
Record Nr. | UNINA-9910392740103321 |
Corradini Isabella | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bullying and Violence in South Korea [[electronic resource] ] : From Home to School and Beyond / / by Trent Bax |
Autore | Bax Trent |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2016 |
Descrizione fisica | 1 online resource (394 pages) : illustrations, tables |
Disciplina | 371.58 |
Collana | Palgrave Advances in Criminology and Criminal Justice in Asia |
Soggetto topico |
Critical criminology
Crime—Sociological aspects Transnational crime Computer crimes Juvenile delinquents Critical Criminology Crime and Society Transnational Crime Cybercrime Youth Offending and Juvenile Justice |
ISBN | 3-319-44612-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction - South Korea’s Young, How Are You Doing? -- Chapter 2. The Initial Spark - A Contemporary History of School Violence -- Chapter 3. The Fuel - Consumer Culture, Exclusion, Ethics & Idols -- Chapter 4. The Fire - Bullying & Violence by Adults at Work -- Chapter 5. The Explosion - Political & Personal Reactions to School Violence. |
Record Nr. | UNINA-9910735388003321 |
Bax Trent | ||
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Collaborative Approaches for Cyber Security in Cyber-Physical Systems [[electronic resource] /] / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (XII, 226 p. 65 illus., 48 illus. in color.) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Data protection
Computer crimes Business information services Security systems Data and Information Security Cybercrime IT in Business Security Science and Technology |
ISBN | 3-031-16088-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Collaborative and confidential architectures for information sharing and analytics -- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware -- 3. Virtualized security-awareness systems and digital twins -- 4. Empirical evaluation of system vulnerabilities -- 5. Collaborative physical and cyber defense requirements -- 6. Heterogeneous data centric security policies specification and enforcement -- 7. Big data for anomaly and advanced threats detection -- 8. Collaborative identification and ranking of malware -- 9. Visual analytics techniques for cyber security -- 10. Collaborative mitigation methodologies against advanced and persistent attacks. |
Record Nr. | UNINA-9910639892803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Collaborative Approaches for Cyber Security in Cyber-Physical Systems [[electronic resource] /] / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (XII, 226 p. 65 illus., 48 illus. in color.) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Data protection
Computer crimes Business information services Security systems Data and Information Security Cybercrime IT in Business Security Science and Technology |
ISBN | 3-031-16088-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Collaborative and confidential architectures for information sharing and analytics -- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware -- 3. Virtualized security-awareness systems and digital twins -- 4. Empirical evaluation of system vulnerabilities -- 5. Collaborative physical and cyber defense requirements -- 6. Heterogeneous data centric security policies specification and enforcement -- 7. Big data for anomaly and advanced threats detection -- 8. Collaborative identification and ranking of malware -- 9. Visual analytics techniques for cyber security -- 10. Collaborative mitigation methodologies against advanced and persistent attacks. |
Record Nr. | UNISA-996547960403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Combatting Cybercrime and Cyberterrorism [[electronic resource] ] : Challenges, Trends and Priorities / / edited by Babak Akhgar, Ben Brewster |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XII, 323 p. 36 illus.) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer crimes
Computer security System safety Cybercrime Systems and Data Security Security Science and Technology |
ISBN | 3-319-38930-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1- Approaching Cybercrime and Cyberterrorism Research -- Part 2- Legal, Ethical and Privacy Considerations -- Part 3- Technologies, Scenarios and Best Practices -- Part 4- Policy Development and Roadmaps for CC/CT Research. |
Record Nr. | UNINA-9910253308803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Contemporary Sex Offender Risk Management, Volume I [[electronic resource] ] : Perceptions / / edited by Kieran McCartan, Hazel Kemshall |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017 |
Descrizione fisica | 1 online resource (XIX, 235 p. 11 illus., 7 illus. in color.) |
Disciplina | 364.9 |
Collana | Palgrave Studies in Risk, Crime and Society |
Soggetto topico |
Sex crimes
Crime—Sociological aspects Public safety Corrections Punishment Computer crimes Sexual Offending Crime and Society Crime Control and Security Prison and Punishment Cybercrime |
ISBN | 3-319-63567-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Historical Evolution of Sex Offender Risk Management; Hazel Kemshall -- 2. Public Health, Prevention and Risk Management; Jon Brown -- 3. Public Education, Prevention and Risk Management; Joan Tabachnick, Kieran Mccartan -- 4. Preventive Sentencing; Nicola Padfield -- 5. “An Exceptional Sentence”; Yvonne Gailey, Lesley Martin, Rachel Webb -- 6. Panic or Placebo?; Andy Williams -- 7. Building and Sustaining a Resilient Workforce; Lydia Guthrie -- 8. The Third Sector Role in Managing Serious Offenders; Mary S Corcoran, Sam Weston. |
Record Nr. | UNINA-9910255262403321 |
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Contemporary Sex Offender Risk Management, Volume II [[electronic resource] ] : Responses / / edited by Hazel Kemshall, Kieran McCartan |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017 |
Descrizione fisica | 1 online resource (XVII, 233 p. 9 illus., 4 illus. in color.) |
Disciplina | 364.168 |
Collana | Palgrave Studies in Risk, Crime and Society |
Soggetto topico |
Sex crimes
Crime—Sociological aspects Public safety Corrections Punishment Computer crimes Sexual Offending Crime and Society Crime Control and Security Prison and Punishment Cybercrime |
ISBN | 3-319-63573-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Behavioural Crime Linkage And Multi-Agency Working; Leah. Ashmore-Hills, Amy. Burrell, Matthew Tonkin -- 2. Assessment Of Risk To Sexually Reoffend; Robin Wilson, Jeffrey C. Sandler -- 3. Critical Reflections On The Risk-Based Prevention Of Sexual Offending By Young People; Stephen Case -- 4. Managing Sexual And Violent Offenders Across Eu Borders; Sarah Hilder -- 5. Online Sex Offending And Risk Management; Maggie Brennan, Hannah Merdian, Derek Perkins -- 6. Risk Management Of Youth Who Sexually Offend; Gerald Zeng, Chu Chi Meng -- 7. Desistance From Sexual Offending And Risk Management; Joanne Hulley -- 8. Reframing The Sex Offender Register And Disclosure; Kieran Mccartan, Hazel Kemshall, James Hoggett. |
Record Nr. | UNINA-9910255268803321 |
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Countering Cyber Threats to Financial Institutions [[electronic resource] ] : A Private and Public Partnership Approach to Critical Infrastructure Protection / / by Pierre-Luc Pomerleau, David L. Lowery |
Autore | Pomerleau Pierre-Luc |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020 |
Descrizione fisica | 1 online resource (237 pages) |
Disciplina | 332.10684 |
Soggetto topico |
Risk management
Bank marketing Computer crimes Financial engineering Finance, Public Risk Management Financial Services Cybercrime Financial Engineering Public Finance |
ISBN | 3-030-54054-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Contemporary Cybersecurity in Our Daily Lives -- Chapter 2: Relevance of Evidence Based Cybersecurity in Guiding the Financial Sector’s & Efforts in Fighting Cybercrime -- Chapter 3: The Evolution of Cybersecurity within the American Financial Sector -- Chapter 4: The Evolution of the Threats to Canadian Financial Institutions, the Actual State of Public and Private Partnerships in Canada -- Chapter 5: Major Themes in the Literature of Cybersecurity and Public-Private Partnerships; A Focus on Financial Institutions -- Chapter 6: Research Findings; Contemporary Perceptions of Canadian Security Professionals Regarding the Challenges in Sharing Information with the Public Sector -- Chapter 7: Conclusions and Implications for Practice and Future Studies on Public-Private Partnerships. |
Record Nr. | UNINA-9910416128603321 |
Pomerleau Pierre-Luc | ||
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Countering Cyberterrorism [[electronic resource] ] : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari |
Autore | Montasari Reza |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (175 pages) |
Disciplina | 060 |
Collana | Advances in Information Security |
Soggetto topico |
Computer networks—Security measures
Artificial intelligence Computer crimes Mobile and Network Security Artificial Intelligence Cybercrime |
ISBN |
9783031219207
9783031219191 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Government’s Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- Chilling Effect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. . |
Record Nr. | UNINA-9910637731903321 |
Montasari Reza | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|