Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution [[electronic resource] ] : Threats, Assessment and Responses / / by Reza Montasari |
Autore | Montasari Reza |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (276 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Data protection
Computer crimes Artificial intelligence International criminal law Criminology Security systems Data and Information Security Cybercrime Artificial Intelligence International Criminal Law Crime Control and Security Security Science and Technology |
ISBN | 3-031-50454-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Unravelling State Crimes: A Critical Analysis of the Iraq War and Its Global Ramifications -- 2. Assessing the Effectiveness of UK Counter-Terrorism Strategies and Alternative Approaches -- 3. Understanding and Assessing the Role of Women in Terrorism -- 4. Exploring the Current Landscape of Cyberterrorism: Insights, Strategies, and the Impact of COVID-19 -- 5. Exploring the Imminence of Cyberterrorism Threat to National Security -- 6. The Impact of Technology on Radicalisation to Violent Extremism and Terrorism in Contemporary Security Landscape -- 7. Techniques in Countering Cyberterrorism Approaches with Those Adopted by State Adversaries -- 8. Analysing Ethical, Legal, Technical and Operational Challenges of the Application of Machine Learning in Countering Cyber Terrorism -- 9. Addressing Ethical, Legal, Technical, and Operational Challenges in Counterterrorism with Machine Learning: Recommendations and Strategies -- 10. The Dual Role of Artificial Intelligence in Online Disinformation: A Critical Analysis. |
Record Nr. | UNINA-9910805581903321 |
Montasari Reza | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Science in Cybersecurity and Cyberthreat Intelligence [[electronic resource] /] / edited by Leslie F. Sikos, Kim-Kwang Raymond Choo |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (140 pages) |
Disciplina | 005.8 |
Collana | Intelligent Systems Reference Library |
Soggetto topico |
Engineering—Data processing
Computational intelligence Artificial intelligence Computer crimes Data Engineering Computational Intelligence Artificial Intelligence Cybercrime Computer Crime |
ISBN | 3-030-38788-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Formal Representation of Cyberthreats for Automated Reasoning -- A Logic Programming Approach to Predict Enterprise-Targeted Cyberattacks -- Discovering Malicious URLs Using Machine Learning Techniques -- Machine Learning and Big Data Processing for Cybersecurity Data Analysis -- Systematic Analysis of Security Implementation for Internet of Health Things in Mobile Health Networks -- Seven Pitfalls of Using Data Science in Cybersecurity. |
Record Nr. | UNINA-9910484812003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Thieves in Action [[electronic resource] ] : Examining the International Market for Stolen Personal Information / / by Thomas J. Holt, Olga Smirnova, Yi-Ting Chua |
Autore | Holt Thomas J |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | New York : , : Palgrave Macmillan US : , : Imprint : Palgrave Macmillan, , 2016 |
Descrizione fisica | 1 online resource (164 p.) |
Disciplina | 364 |
Collana | Palgrave Studies in Cybercrime and Cybersecurity |
Soggetto topico |
Computer crimes
Organized crime Police Crime—Sociological aspects Social media Cybercrime Organized Crime Policing Crime and Society Social Media |
ISBN | 1-137-58904-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction -- Chapter 2. The Marketing and Sales of Stolen Data -- Chapter 3. The Economic Impact of Stolen Data Markets -- Chapter 4. The Social Organization of Actors in Stolen Data Markets -- Chapter 5. Visualizing The Networks of Economic Transactions and Ads in Stolen Data Markets -- Chapter 6. Implications and Conclusions. |
Record Nr. | UNINA-9910255195203321 |
Holt Thomas J | ||
New York : , : Palgrave Macmillan US : , : Imprint : Palgrave Macmillan, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Deep Learning Applications for Cyber Security [[electronic resource] /] / edited by Mamoun Alazab, MingJian Tang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (260 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Big data
Computer crimes Neural networks (Computer science) Computer security System safety Big Data Cybercrime Mathematical Models of Cognitive Processes and Neural Networks Systems and Data Security Security Science and Technology |
ISBN | 3-030-13057-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft -- Deep Learning in Person Re-identication for Cyber-Physical Surveillance Systems -- Deep Learning-based Detection of Electricity Theft Cyber-attacks in Smart Grid AMI Networks -- Using Convolutional Neural Networks for Classifying Malicious Network Traffic -- DBD: Deep Learning DGA-based Botnet Detection -- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks -- Intrusion Detection in SDN-based Networks: Deep Recurrent Neural Network Approach -- SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks -- Forensic Detection of Child Exploitation Material using Deep Learning -- Toward Detection of Child Exploitation Material: A Forensic Approach. |
Record Nr. | UNINA-9910349287503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Deviance in Social Media and Social Cyber Forensics [[electronic resource] ] : Uncovering Hidden Relations Using Open Source Information (OSINF) / / by Samer Al-khateeb, Nitin Agarwal |
Autore | Al-khateeb Samer |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (116 pages) |
Disciplina | 302.30285 |
Collana | SpringerBriefs in Cybersecurity |
Soggetto topico |
Computer security
Social sciences—Data processing Social sciences—Computer programs Computer crimes Physics Data mining Systems and Data Security Computational Social Sciences Cybercrime Applications of Graph Theory and Complex Networks Data Mining and Knowledge Discovery |
ISBN | 3-030-13690-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter1: Deviance in Social Media -- Chapter2: Social Network Measures and Analysis -- Chapter3: Tools and Methodologies for Data Collection, Analysis, and Visualization -- Chapter4: Social Cyber Forensics (SCF): Uncovering Hidden Relationships -- Chapter5: Case Studies of Deviance on Social Media. |
Record Nr. | UNINA-9910337561403321 |
Al-khateeb Samer | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Extremisms [[electronic resource] ] : Readings in Violence, Radicalisation and Extremism in the Online Space / / edited by Mark Littler, Benjamin Lee |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020 |
Descrizione fisica | 1 online resource (xiii, 268 pages) |
Disciplina | 363.3250956 |
Collana | Palgrave Studies in Cybercrime and Cybersecurity |
Soggetto topico |
Computer crimes
Criminal behavior Police Criminology Research Mass media and crime Cybercrime Criminal Behavior Policing Research Methods in Criminology Crime and the Media |
ISBN | 3-030-30138-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction, Mark Lee And Benjamin Littler -- 2. Pioneers Of World Wide Web Fascism: The British Extreme Right And Web 1.0, Jackson And Jones -- 3. Cumulative Extremism And The Online Space - Reciprocal Radicalisation Effects Between The Extreme Right And Radical Islamists In The UK, Allchorn -- 4. Haters Gonna Like: Exploring Canadian Far-Right Extremism On Facebook, Scrivens And Amarasingam -- 5. Neo-Nazis Have Stolen Our Memes: Making Sense Of Extreme Memes, Benjamin Lee -- 6. Then And Now: Irish Republicanism And Ulster Loyalism Online, Bowman-Grieve And Herron -- 7. Animal Rights Extremism And The Internet, Monaghan And Mcalister -- 8. Demonic Slappers And Fascists? Exploring Extreme British Anti-Abortion Activism On Facebook, Mark Littler -- 9. Jihadi Fans Revisited: Mapping The Commonalities With Non-Islamic Extremism, Ramsay -- 10. Developing Effective And Ethical ‘Secondary’ Intervention Programmes To Counter Radicalisation And Polarisation, Birdwell -- 11. Researching The Radical Right: Making Use Of The Digital Space And Its Challenges, Carter And Kondor -- 12. Conclusion, Mark Littler and Benjamin Lee. |
Record Nr. | UNINA-9910373890503321 |
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Finance, Bits and Bytes [[electronic resource] ] : The Road Ahead / / by Vasant Chintaman Joshi |
Autore | Joshi Vasant Chintaman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Palgrave Macmillan, , 2020 |
Descrizione fisica | 1 online resource (224 pages) |
Disciplina | 332.10684 |
Soggetto topico |
Banks and banking
E-business Electronic commerce E-commerce Personal finance Pension plans Insurance Computer crimes Management Industrial management Banking e-Business/e-Commerce Personal Finance/Wealth Management/Pension Planning Cybercrime Innovation/Technology Management |
ISBN | 981-15-3431-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1 A Brief Review - Socio-Economic Changes -- Chapter 2 Technology Challenges – Impact Assessment -- Chapter 3 The Internet – Engine for Change -- Chapter 4 E-Insurance -- Chapter 5 E-Banking -- Chapter 6 E-Trading -- Chapter 7 Cyber Crimes and Laws -- Chapter 8 General Risk Management -- Chapter 9 Cyber Risk Management -- Chapter 10 Human Resource Management -- Chapter 11 E-Marketing -- Chapter 12 Regulating Banks and Insurance Companies -- Chapter 13 The Road Ahead. |
Record Nr. | UNINA-9910409674603321 |
Joshi Vasant Chintaman | ||
Singapore : , : Springer Singapore : , : Imprint : Palgrave Macmillan, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Forensic Education [[electronic resource] ] : An Experiential Learning Approach / / edited by Xiaolu Zhang, Kim-Kwang Raymond Choo |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xii, 307 pages) : illustrations |
Disciplina | 363.25968 |
Collana | Studies in Big Data |
Soggetto topico |
Engineering—Data processing
Big data Computer crimes Computational intelligence Artificial intelligence Data Engineering Big Data Cybercrime Computational Intelligence Artificial Intelligence |
ISBN | 3-030-23547-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | DFRWS IoT Forensic Challenge -- Alexa and Google Home Forensics -- Digital Forensics of Raspberry Pi used for MITM -- Forensic Analysis on kindle and android -- Mobile forensics -- SSD Forensics Evidence Generation and Analysis -- Web Browser Forensics in Google Chrome, Mozilla Firefox, and the Tor Browser Bundle -- Web Browser Forensic Analysis of Social Dating Website Tinder -- Forensic Analysis of Microblogging Sites using Pinterest and Tumblr as Case study -- Social Media Data in Digital Forensic Investigations. |
Record Nr. | UNINA-9910741177803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Image Forensics [[electronic resource] ] : Theory and Implementation / / by Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty |
Autore | Roy Aniket |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVI, 89 p. 45 illus., 32 illus. in color.) |
Disciplina | 363.252 |
Collana | Studies in Computational Intelligence |
Soggetto topico |
Signal processing
Image processing Speech processing systems Optical data processing Computer crimes Signal, Image and Speech Processing Image Processing and Computer Vision Cybercrime |
ISBN | 981-10-7644-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Introduction -- Chapter 2: Source Camera Identification Using Statistical Features -- Chapter 3: Copy Move Forgery Detection in Digital Images – A Survey and Analysis -- Chapter 4: Copy–Move Forgery Detection exploiting Statistical Image Features -- Chapter 5: Blur-invariant Copy-move Forgery Detection utilizing SWT-SVD -- Chapter 6: Copy–Move Forgery Detection with Similar but Genuine Objects using Texture Features -- Chapter 7: Conclusions and Future Work. |
Record Nr. | UNINA-9910366596103321 |
Roy Aniket | ||
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Ethics of Cybersecurity [[electronic resource] /] / edited by Markus Christen, Bert Gordijn, Michele Loi |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (384) |
Disciplina | 601 |
Collana | The International Library of Ethics, Law and Technology |
Soggetto topico |
Engineering ethics
Mass media Law Computer crimes Computer security Engineering Ethics IT Law, Media Law, Intellectual Property Cybercrime Privacy |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction -- Part 1. Foundations -- Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) -- Chapter 3. Core values in Cybersecurity (Ibo van de Poel) -- Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) -- Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) -- Part 2 – Problems -- Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) -- Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) -- Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) -- Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) -- Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) -- Chapter 11. Cybersecurity and Democracy -- Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) -- Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers -- Chapter 14. Cybersecurity and the Individual -- Part 3 – Solutions -- Chapter 15. Requirements on the Policy Level to Ensure Cyberpeace -- Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) -- Chapter 17. A framework for Ethical Cyber-Defence for Companies -- Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) -- Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare -- Chapter 20. Conclusion. |
Record Nr. | UNINA-9910372787303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|