top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Countering Cyberterrorism [[electronic resource] ] : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari
Countering Cyberterrorism [[electronic resource] ] : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari
Autore Montasari Reza
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (175 pages)
Disciplina 060
Collana Advances in Information Security
Soggetto topico Computer networks—Security measures
Artificial intelligence
Computer crimes
Mobile and Network Security
Artificial Intelligence
Cybercrime
ISBN 9783031219207
9783031219191
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Government’s Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- Chilling Effect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. .
Record Nr. UNISA-996547969703316
Montasari Reza  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Counterintelligence in a Cyber World [[electronic resource] /] / by Paul A. Watters
Counterintelligence in a Cyber World [[electronic resource] /] / by Paul A. Watters
Autore Watters Paul A
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (152 pages)
Disciplina 005.8
Soggetto topico Computer networks—Security measures
Computer crimes
Security, International
Mobile and Network Security
Cybercrime
International Security Studies
ISBN 3-031-35287-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Counterintelligence Theory -- Chapter. 2. The Cyber Operational Environment -- Chapter. 3. Cyber Threats (and Opportunities) -- Chapter. 4. Psychology and Criminal Profiling -- Chapter. 5. Counterespionage -- Chapter. 6. Technical Surveillance -- Chapter. 7. Physical Surveillance -- Chapter. 8. Data Analysis -- Chapter. 9. Attack Attribution -- Chapter. 10. Practical Deception -- Chapter. 11. Legal Issues in Cyber Counterintelligence -- Chapter. 12. Ethical Issues in Cyber Counterintelligence.
Record Nr. UNINA-9910734886103321
Watters Paul A  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Counterintelligence in a Cyber World [[electronic resource] /] / by Paul A. Watters
Counterintelligence in a Cyber World [[electronic resource] /] / by Paul A. Watters
Autore Watters Paul A
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (152 pages)
Disciplina 005.8
Soggetto topico Computer networks—Security measures
Computer crimes
Security, International
Mobile and Network Security
Cybercrime
International Security Studies
ISBN 3-031-35287-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Counterintelligence Theory -- Chapter. 2. The Cyber Operational Environment -- Chapter. 3. Cyber Threats (and Opportunities) -- Chapter. 4. Psychology and Criminal Profiling -- Chapter. 5. Counterespionage -- Chapter. 6. Technical Surveillance -- Chapter. 7. Physical Surveillance -- Chapter. 8. Data Analysis -- Chapter. 9. Attack Attribution -- Chapter. 10. Practical Deception -- Chapter. 11. Legal Issues in Cyber Counterintelligence -- Chapter. 12. Ethical Issues in Cyber Counterintelligence.
Record Nr. UNISA-996546827103316
Watters Paul A  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Crime, Genes, Neuroscience and Cyberspace [[electronic resource] /] / by Tim Owen
Crime, Genes, Neuroscience and Cyberspace [[electronic resource] /] / by Tim Owen
Autore Owen Tim
Edizione [1st ed. 2017.]
Pubbl/distr/stampa London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2017
Descrizione fisica 1 online resource (XIII, 232 p.)
Disciplina 364.01
Soggetto topico Criminology
Computer crimes
Critical criminology
Neurosciences
Criminological Theory
Cybercrime
Critical Criminology
ISBN 1-137-52688-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910255276903321
Owen Tim  
London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Security and Resilience [[electronic resource] ] : Theories, Methods, Tools and Technologies / / edited by Dimitris Gritzalis, Marianthi Theocharidou, George Stergiopoulos
Critical Infrastructure Security and Resilience [[electronic resource] ] : Theories, Methods, Tools and Technologies / / edited by Dimitris Gritzalis, Marianthi Theocharidou, George Stergiopoulos
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (311 pages)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer security
System safety
Data protection
Computer communication systems
Application software
Computer crimes
Systems and Data Security
Security Science and Technology
Security
Computer Communication Networks
Computer Appl. in Administrative Data Processing
Cybercrime
ISBN 3-030-00024-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Resilience Approach to Critical Information Infrastructures -- Methodologies and Strategies for Critical Infrastructure Protection -- Risk Analysis for Critical Infrastructure Protection -- On Risk-Based Analysis of the Vulnerability of Urban Infrastructure to the Consequences of Climate Change -- Identification of Vulnerabilities in Networked Systems -- Game-Theoretic Decision Making for the Resilience of Interdependent Infrastructures Exposed to Disruptions -- Smallest Pseudo Target Set Identification and Related Problems Using the Implicative Interdependency Model -- Leveraging Network Theory and Stress Tests to Assess Interdependencies in Critical Infrastructures -- Micro-Grid Control Security Analysis: Analysis of Current and Emerging Vulnerabilities -- Engineering Edge Security in Industrial Control Systems -- Secure Interconnection of IT-OT Networks in the Industry 4 -- Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, Red October, and REGIN -- Aviation Cybersecurity and Cyber-Resilience: Assessing Risk in Air Traffic Management -- Open Source Intelligence for Energy Sector Cyberattacks -- A Target-Based Classification Method of Side Channel Attacks Towards Critical Infrastructure Protection.
Record Nr. UNINA-9910337575803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Criminology [[electronic resource] /] / edited by Hamid Jahankhani
Cyber Criminology [[electronic resource] /] / edited by Hamid Jahankhani
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (357 pages)
Disciplina 364.168
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Computer crimes
Criminal law
System safety
Data protection
Cybercrime
Criminal Law and Criminal Procedure Law
Security Science and Technology
Security
ISBN 9783319971810
3319971816
9783319971803
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- Cyber Criminology and Psychology -- Crime and Social Media: Legal responses to offensive online communications and abuse -- Explaining Why Cybercrime Occurs: Criminological and Psychological Theories -- Cyberaggression and Cyberbullying: Widening the Net -- Part 2 Cyber-Threat Landscape -- Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments -- The Dark Web -- Tor black markets: economics characterization and investigation technique; G. Me, L. Pesticcio -- A New Scalable Botnet Detection Method in the Frequency Domain -- Part 3 Cybercrime Detection -- Predicting the Cyber Attackers; a Comparison of Different Classification Techniques -- Criminal Data Mining, Threat Analysis and Prediction -- SMERF: Social Media, Ethics & Risk Framework; I. Mitchell et al -- Understanding the cyber-victimisation of people with long term conditions and the need for collaborative forensics-enabled Disease Management Programmes -- An Investigator’s Christmas Carol - Past, Present, and Future Law Enforcement Agency Data Mining Practices -- DaPA: Deconstruct and Preserve for all: A Procedure for the Preservation of Digital Evidence on Solid State Drives and Traditional Storage Media -- Part 4 Education, Training and Awareness in Cybercrime Prevention -- An examination into the effect of early education on cyber security awareness within the U.K -- An examination into the level of training, education and awareness among frontline police officers in tackling cybercrime within the Metropolitan Police Service -- Combating Cyber Victimisation: Cybercrime Prevention -- Information security landscape in Vietnam: insights from two research surveys.
Record Nr. UNINA-9910300049503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Economic Crime in India [[electronic resource] ] : An Integrated Model for Prevention and Investigation / / by Balsing Rajput
Cyber Economic Crime in India [[electronic resource] ] : An Integrated Model for Prevention and Investigation / / by Balsing Rajput
Autore Rajput Balsing
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (277 pages)
Disciplina 364.168
Collana Springer Series on Asian Criminology and Criminal Justice Research
Soggetto topico Computer crimes
Commercial crimes
Police
Cybercrime
Financial Crime
Policing
ISBN 3-030-44655-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part One: Introduction -- 1. Introduction -- 2. Changing Landscape of Crime in Cyberspace -- 3. Cyber Economic Crime: Criminological studies and Frameworks -- Part Two: Understanding Phenomenon -- 4. Exploring the Phenomenon of Cyber Economic Crime -- 5. Cyber Economic Crime Typology -- 6. Emerging Trends and Patterns of CEC -- Part Three: Response of System in Combating the CEC -- 7. Legal Framework for Cyber Economic Crime in India: A Review -- 8. Criminal Justice Administration in India: An Overview -- 9. Response of Criminal Justice System -- Part Four: Way Forward for Combating CEC -- 10 Integrated Cybercrime and Cyber Security Model.
Record Nr. UNINA-9910410031003321
Rajput Balsing  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Racism and Community Resilience [[electronic resource] ] : Strategies for Combating Online Race Hate / / by Andrew Jakubowicz, Kevin Dunn, Gail Mason, Yin Paradies, Ana-Maria Bliuc, Nasya Bahfen, Andre Oboler, Rosalie Atie, Karen Connelly
Cyber Racism and Community Resilience [[electronic resource] ] : Strategies for Combating Online Race Hate / / by Andrew Jakubowicz, Kevin Dunn, Gail Mason, Yin Paradies, Ana-Maria Bliuc, Nasya Bahfen, Andre Oboler, Rosalie Atie, Karen Connelly
Autore Jakubowicz Andrew
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017
Descrizione fisica 1 online resource (XXIV, 376 p. 13 illus. in color.)
Disciplina 658.478
Collana Palgrave Hate Studies
Soggetto topico Computer crimes
Crime—Sociological aspects
Mass media
Communication
Racism in the social sciences
Hate crimes
Cybercrime
Crime and Society
Media Sociology
Sociology of Racism
Hate Studies
ISBN 3-319-64388-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Context: “Cyberspace”, “Race” and Community Resilience -- 2. Researching Cyber Racism: Methodologies and Methods Across Disciplines -- 3. How Cyber Users Experience and Respond to Racism: Evidence from an Online Survey -- 4. Racism and the Affordances of the Internet -- 5. Targets -- 6. Racist Narratives Online -- 7. Building Online Communities of Resistance and Solidarity -- 8. Promoting Resilience Through Regulation -- 9. Conclusion: Future Directions in Building Community Resilience.
Record Nr. UNINA-9910255269003321
Jakubowicz Andrew  
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security [[electronic resource] ] : Proceedings of CSI 2015 / / edited by M. U. Bokhari, Namrata Agrawal, Dharmendra Saini
Cyber Security [[electronic resource] ] : Proceedings of CSI 2015 / / edited by M. U. Bokhari, Namrata Agrawal, Dharmendra Saini
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (498 pages)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computer security
Computer crimes
Coding theory
Information theory
Systems and Data Security
Cybercrime
Coding and Information Theory
ISBN 981-10-8536-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910299928203321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Weaponry [[electronic resource] ] : Issues and Implications of Digital Arms / / edited by Henry Prunckun
Cyber Weaponry [[electronic resource] ] : Issues and Implications of Digital Arms / / edited by Henry Prunckun
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (206 pages)
Disciplina 364.168
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Public safety
Security, International
Computer security
Management information systems
Computer crimes
Politics and war
Crime Control and Security
International Security Studies
Systems and Data Security
Business IT Infrastructure
Cybercrime
Military and Defence Studies
ISBN 3-319-74107-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Dedication -- Forward by David Irvine -- Preface -- About the Study Questions -- Acknowledgment -- Weaponization of Computer -- Human Nature and Cyber Weaponry: use of Denial and Deception in Cyber Counterintelligence.-  The Human Element: The 'Trigger' on Cyber Weapons -- Cyber Defence for IMGs and NGOs Using Crime Prevention through Environmental Design -- Drinking from a Fire Hydrant: Information Overload as a Cyber Weapon -- Archer's Stakes in Cyber Space: Methods to Analyze Force Advantage.- The Rule of Law: Controlling Cyber Weapons -- Double-Edged Sword: Dual-Purpose Cyber Security Methods -- "Who Was that Masked Man?": System Penetrations;Friend or Foe? -- Development and Proliferation of Offensive Weapons in Cyber-Security; T. Herr -- No Smoking Gun: Cyber Weapons and Drug Traffickers -- Autonomous Weapons: Terminator-Esque Software Design -- Warfare of the Future -- Researching Cyber Weapons: An Enumerative Bibliography -- About the Editor and Contributors -- Index.
Record Nr. UNINA-9910299864703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui