Countering Cyberterrorism [[electronic resource] ] : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari |
Autore | Montasari Reza |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (175 pages) |
Disciplina | 060 |
Collana | Advances in Information Security |
Soggetto topico |
Computer networks—Security measures
Artificial intelligence Computer crimes Mobile and Network Security Artificial Intelligence Cybercrime |
ISBN |
9783031219207
9783031219191 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Government’s Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- Chilling Effect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. . |
Record Nr. | UNISA-996547969703316 |
Montasari Reza | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Counterintelligence in a Cyber World [[electronic resource] /] / by Paul A. Watters |
Autore | Watters Paul A |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (152 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks—Security measures
Computer crimes Security, International Mobile and Network Security Cybercrime International Security Studies |
ISBN | 3-031-35287-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter. 1. Counterintelligence Theory -- Chapter. 2. The Cyber Operational Environment -- Chapter. 3. Cyber Threats (and Opportunities) -- Chapter. 4. Psychology and Criminal Profiling -- Chapter. 5. Counterespionage -- Chapter. 6. Technical Surveillance -- Chapter. 7. Physical Surveillance -- Chapter. 8. Data Analysis -- Chapter. 9. Attack Attribution -- Chapter. 10. Practical Deception -- Chapter. 11. Legal Issues in Cyber Counterintelligence -- Chapter. 12. Ethical Issues in Cyber Counterintelligence. |
Record Nr. | UNINA-9910734886103321 |
Watters Paul A | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Counterintelligence in a Cyber World [[electronic resource] /] / by Paul A. Watters |
Autore | Watters Paul A |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (152 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks—Security measures
Computer crimes Security, International Mobile and Network Security Cybercrime International Security Studies |
ISBN | 3-031-35287-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter. 1. Counterintelligence Theory -- Chapter. 2. The Cyber Operational Environment -- Chapter. 3. Cyber Threats (and Opportunities) -- Chapter. 4. Psychology and Criminal Profiling -- Chapter. 5. Counterespionage -- Chapter. 6. Technical Surveillance -- Chapter. 7. Physical Surveillance -- Chapter. 8. Data Analysis -- Chapter. 9. Attack Attribution -- Chapter. 10. Practical Deception -- Chapter. 11. Legal Issues in Cyber Counterintelligence -- Chapter. 12. Ethical Issues in Cyber Counterintelligence. |
Record Nr. | UNISA-996546827103316 |
Watters Paul A | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Crime, Genes, Neuroscience and Cyberspace [[electronic resource] /] / by Tim Owen |
Autore | Owen Tim |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2017 |
Descrizione fisica | 1 online resource (XIII, 232 p.) |
Disciplina | 364.01 |
Soggetto topico |
Criminology
Computer crimes Critical criminology Neurosciences Criminological Theory Cybercrime Critical Criminology |
ISBN | 1-137-52688-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910255276903321 |
Owen Tim | ||
London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Infrastructure Security and Resilience [[electronic resource] ] : Theories, Methods, Tools and Technologies / / edited by Dimitris Gritzalis, Marianthi Theocharidou, George Stergiopoulos |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (311 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
System safety Data protection Computer communication systems Application software Computer crimes Systems and Data Security Security Science and Technology Security Computer Communication Networks Computer Appl. in Administrative Data Processing Cybercrime |
ISBN | 3-030-00024-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Resilience Approach to Critical Information Infrastructures -- Methodologies and Strategies for Critical Infrastructure Protection -- Risk Analysis for Critical Infrastructure Protection -- On Risk-Based Analysis of the Vulnerability of Urban Infrastructure to the Consequences of Climate Change -- Identification of Vulnerabilities in Networked Systems -- Game-Theoretic Decision Making for the Resilience of Interdependent Infrastructures Exposed to Disruptions -- Smallest Pseudo Target Set Identification and Related Problems Using the Implicative Interdependency Model -- Leveraging Network Theory and Stress Tests to Assess Interdependencies in Critical Infrastructures -- Micro-Grid Control Security Analysis: Analysis of Current and Emerging Vulnerabilities -- Engineering Edge Security in Industrial Control Systems -- Secure Interconnection of IT-OT Networks in the Industry 4 -- Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, Red October, and REGIN -- Aviation Cybersecurity and Cyber-Resilience: Assessing Risk in Air Traffic Management -- Open Source Intelligence for Energy Sector Cyberattacks -- A Target-Based Classification Method of Side Channel Attacks Towards Critical Infrastructure Protection. |
Record Nr. | UNINA-9910337575803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Criminology [[electronic resource] /] / edited by Hamid Jahankhani |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (357 pages) |
Disciplina | 364.168 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer crimes
Criminal law System safety Data protection Cybercrime Criminal Law and Criminal Procedure Law Security Science and Technology Security |
ISBN |
9783319971810
3319971816 9783319971803 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Cyber Criminology and Psychology -- Crime and Social Media: Legal responses to offensive online communications and abuse -- Explaining Why Cybercrime Occurs: Criminological and Psychological Theories -- Cyberaggression and Cyberbullying: Widening the Net -- Part 2 Cyber-Threat Landscape -- Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments -- The Dark Web -- Tor black markets: economics characterization and investigation technique; G. Me, L. Pesticcio -- A New Scalable Botnet Detection Method in the Frequency Domain -- Part 3 Cybercrime Detection -- Predicting the Cyber Attackers; a Comparison of Different Classification Techniques -- Criminal Data Mining, Threat Analysis and Prediction -- SMERF: Social Media, Ethics & Risk Framework; I. Mitchell et al -- Understanding the cyber-victimisation of people with long term conditions and the need for collaborative forensics-enabled Disease Management Programmes -- An Investigator’s Christmas Carol - Past, Present, and Future Law Enforcement Agency Data Mining Practices -- DaPA: Deconstruct and Preserve for all: A Procedure for the Preservation of Digital Evidence on Solid State Drives and Traditional Storage Media -- Part 4 Education, Training and Awareness in Cybercrime Prevention -- An examination into the effect of early education on cyber security awareness within the U.K -- An examination into the level of training, education and awareness among frontline police officers in tackling cybercrime within the Metropolitan Police Service -- Combating Cyber Victimisation: Cybercrime Prevention -- Information security landscape in Vietnam: insights from two research surveys. |
Record Nr. | UNINA-9910300049503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Economic Crime in India [[electronic resource] ] : An Integrated Model for Prevention and Investigation / / by Balsing Rajput |
Autore | Rajput Balsing |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (277 pages) |
Disciplina | 364.168 |
Collana | Springer Series on Asian Criminology and Criminal Justice Research |
Soggetto topico |
Computer crimes
Commercial crimes Police Cybercrime Financial Crime Policing |
ISBN | 3-030-44655-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part One: Introduction -- 1. Introduction -- 2. Changing Landscape of Crime in Cyberspace -- 3. Cyber Economic Crime: Criminological studies and Frameworks -- Part Two: Understanding Phenomenon -- 4. Exploring the Phenomenon of Cyber Economic Crime -- 5. Cyber Economic Crime Typology -- 6. Emerging Trends and Patterns of CEC -- Part Three: Response of System in Combating the CEC -- 7. Legal Framework for Cyber Economic Crime in India: A Review -- 8. Criminal Justice Administration in India: An Overview -- 9. Response of Criminal Justice System -- Part Four: Way Forward for Combating CEC -- 10 Integrated Cybercrime and Cyber Security Model. |
Record Nr. | UNINA-9910410031003321 |
Rajput Balsing | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Racism and Community Resilience [[electronic resource] ] : Strategies for Combating Online Race Hate / / by Andrew Jakubowicz, Kevin Dunn, Gail Mason, Yin Paradies, Ana-Maria Bliuc, Nasya Bahfen, Andre Oboler, Rosalie Atie, Karen Connelly |
Autore | Jakubowicz Andrew |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017 |
Descrizione fisica | 1 online resource (XXIV, 376 p. 13 illus. in color.) |
Disciplina | 658.478 |
Collana | Palgrave Hate Studies |
Soggetto topico |
Computer crimes
Crime—Sociological aspects Mass media Communication Racism in the social sciences Hate crimes Cybercrime Crime and Society Media Sociology Sociology of Racism Hate Studies |
ISBN | 3-319-64388-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Context: “Cyberspace”, “Race” and Community Resilience -- 2. Researching Cyber Racism: Methodologies and Methods Across Disciplines -- 3. How Cyber Users Experience and Respond to Racism: Evidence from an Online Survey -- 4. Racism and the Affordances of the Internet -- 5. Targets -- 6. Racist Narratives Online -- 7. Building Online Communities of Resistance and Solidarity -- 8. Promoting Resilience Through Regulation -- 9. Conclusion: Future Directions in Building Community Resilience. |
Record Nr. | UNINA-9910255269003321 |
Jakubowicz Andrew | ||
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security [[electronic resource] ] : Proceedings of CSI 2015 / / edited by M. U. Bokhari, Namrata Agrawal, Dharmendra Saini |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (498 pages) |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computer security
Computer crimes Coding theory Information theory Systems and Data Security Cybercrime Coding and Information Theory |
ISBN | 981-10-8536-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910299928203321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Weaponry [[electronic resource] ] : Issues and Implications of Digital Arms / / edited by Henry Prunckun |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (206 pages) |
Disciplina | 364.168 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Public safety
Security, International Computer security Management information systems Computer crimes Politics and war Crime Control and Security International Security Studies Systems and Data Security Business IT Infrastructure Cybercrime Military and Defence Studies |
ISBN | 3-319-74107-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Dedication -- Forward by David Irvine -- Preface -- About the Study Questions -- Acknowledgment -- Weaponization of Computer -- Human Nature and Cyber Weaponry: use of Denial and Deception in Cyber Counterintelligence.- The Human Element: The 'Trigger' on Cyber Weapons -- Cyber Defence for IMGs and NGOs Using Crime Prevention through Environmental Design -- Drinking from a Fire Hydrant: Information Overload as a Cyber Weapon -- Archer's Stakes in Cyber Space: Methods to Analyze Force Advantage.- The Rule of Law: Controlling Cyber Weapons -- Double-Edged Sword: Dual-Purpose Cyber Security Methods -- "Who Was that Masked Man?": System Penetrations;Friend or Foe? -- Development and Proliferation of Offensive Weapons in Cyber-Security; T. Herr -- No Smoking Gun: Cyber Weapons and Drug Traffickers -- Autonomous Weapons: Terminator-Esque Software Design -- Warfare of the Future -- Researching Cyber Weapons: An Enumerative Bibliography -- About the Editor and Contributors -- Index. |
Record Nr. | UNINA-9910299864703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|