top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution [[electronic resource] ] : Threats, Assessment and Responses / / by Reza Montasari
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution [[electronic resource] ] : Threats, Assessment and Responses / / by Reza Montasari
Autore Montasari Reza
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (276 pages)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Computer crimes
Artificial intelligence
International criminal law
Criminology
Security systems
Data and Information Security
Cybercrime
Artificial Intelligence
International Criminal Law
Crime Control and Security
Security Science and Technology
ISBN 3-031-50454-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Unravelling State Crimes: A Critical Analysis of the Iraq War and Its Global Ramifications -- 2. Assessing the Effectiveness of UK Counter-Terrorism Strategies and Alternative Approaches -- 3. Understanding and Assessing the Role of Women in Terrorism -- 4. Exploring the Current Landscape of Cyberterrorism: Insights, Strategies, and the Impact of COVID-19 -- 5. Exploring the Imminence of Cyberterrorism Threat to National Security -- 6. The Impact of Technology on Radicalisation to Violent Extremism and Terrorism in Contemporary Security Landscape -- 7. Techniques in Countering Cyberterrorism Approaches with Those Adopted by State Adversaries -- 8. Analysing Ethical, Legal, Technical and Operational Challenges of the Application of Machine Learning in Countering Cyber Terrorism -- 9. Addressing Ethical, Legal, Technical, and Operational Challenges in Counterterrorism with Machine Learning: Recommendations and Strategies -- 10. The Dual Role of Artificial Intelligence in Online Disinformation: A Critical Analysis.
Record Nr. UNINA-9910805581903321
Montasari Reza  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Science in Cybersecurity and Cyberthreat Intelligence [[electronic resource] /] / edited by Leslie F. Sikos, Kim-Kwang Raymond Choo
Data Science in Cybersecurity and Cyberthreat Intelligence [[electronic resource] /] / edited by Leslie F. Sikos, Kim-Kwang Raymond Choo
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (140 pages)
Disciplina 005.8
Collana Intelligent Systems Reference Library
Soggetto topico Engineering—Data processing
Computational intelligence
Artificial intelligence
Computer crimes
Data Engineering
Computational Intelligence
Artificial Intelligence
Cybercrime
Computer Crime
ISBN 3-030-38788-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Formal Representation of Cyberthreats for Automated Reasoning -- A Logic Programming Approach to Predict Enterprise-Targeted Cyberattacks -- Discovering Malicious URLs Using Machine Learning Techniques -- Machine Learning and Big Data Processing for Cybersecurity Data Analysis -- Systematic Analysis of Security Implementation for Internet of Health Things in Mobile Health Networks -- Seven Pitfalls of Using Data Science in Cybersecurity.
Record Nr. UNINA-9910484812003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Thieves in Action [[electronic resource] ] : Examining the International Market for Stolen Personal Information / / by Thomas J. Holt, Olga Smirnova, Yi-Ting Chua
Data Thieves in Action [[electronic resource] ] : Examining the International Market for Stolen Personal Information / / by Thomas J. Holt, Olga Smirnova, Yi-Ting Chua
Autore Holt Thomas J
Edizione [1st ed. 2016.]
Pubbl/distr/stampa New York : , : Palgrave Macmillan US : , : Imprint : Palgrave Macmillan, , 2016
Descrizione fisica 1 online resource (164 p.)
Disciplina 364
Collana Palgrave Studies in Cybercrime and Cybersecurity
Soggetto topico Computer crimes
Organized crime
Police
Crime—Sociological aspects
Social media
Cybercrime
Organized Crime
Policing
Crime and Society
Social Media
ISBN 1-137-58904-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Chapter 2. The Marketing and Sales of Stolen Data -- Chapter 3. The Economic Impact of Stolen Data Markets -- Chapter 4. The Social Organization of Actors in Stolen Data Markets -- Chapter 5. Visualizing The Networks of Economic Transactions and Ads in Stolen Data Markets -- Chapter 6. Implications and Conclusions.
Record Nr. UNINA-9910255195203321
Holt Thomas J  
New York : , : Palgrave Macmillan US : , : Imprint : Palgrave Macmillan, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Deep Learning Applications for Cyber Security [[electronic resource] /] / edited by Mamoun Alazab, MingJian Tang
Deep Learning Applications for Cyber Security [[electronic resource] /] / edited by Mamoun Alazab, MingJian Tang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (260 pages)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Big data
Computer crimes
Neural networks (Computer science) 
Computer security
System safety
Big Data
Cybercrime
Mathematical Models of Cognitive Processes and Neural Networks
Systems and Data Security
Security Science and Technology
ISBN 3-030-13057-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft -- Deep Learning in Person Re-identication for Cyber-Physical Surveillance Systems -- Deep Learning-based Detection of Electricity Theft Cyber-attacks in Smart Grid AMI Networks -- Using Convolutional Neural Networks for Classifying Malicious Network Traffic -- DBD: Deep Learning DGA-based Botnet Detection -- Enhanced Domain Generating Algorithm Detection Based on Deep Neural Networks -- Intrusion Detection in SDN-based Networks: Deep Recurrent Neural Network Approach -- SeqDroid: Obfuscated Android Malware Detection using Stacked Convolutional and Recurrent Neural Networks -- Forensic Detection of Child Exploitation Material using Deep Learning -- Toward Detection of Child Exploitation Material: A Forensic Approach.
Record Nr. UNINA-9910349287503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Deviance in Social Media and Social Cyber Forensics [[electronic resource] ] : Uncovering Hidden Relations Using Open Source Information (OSINF) / / by Samer Al-khateeb, Nitin Agarwal
Deviance in Social Media and Social Cyber Forensics [[electronic resource] ] : Uncovering Hidden Relations Using Open Source Information (OSINF) / / by Samer Al-khateeb, Nitin Agarwal
Autore Al-khateeb Samer
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (116 pages)
Disciplina 302.30285
Collana SpringerBriefs in Cybersecurity
Soggetto topico Computer security
Social sciences—Data processing
Social sciences—Computer programs
Computer crimes
Physics
Data mining
Systems and Data Security
Computational Social Sciences
Cybercrime
Applications of Graph Theory and Complex Networks
Data Mining and Knowledge Discovery
ISBN 3-030-13690-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter1: Deviance in Social Media -- Chapter2: Social Network Measures and Analysis -- Chapter3: Tools and Methodologies for Data Collection, Analysis, and Visualization -- Chapter4: Social Cyber Forensics (SCF): Uncovering Hidden Relationships -- Chapter5: Case Studies of Deviance on Social Media.
Record Nr. UNINA-9910337561403321
Al-khateeb Samer  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Extremisms [[electronic resource] ] : Readings in Violence, Radicalisation and Extremism in the Online Space / / edited by Mark Littler, Benjamin Lee
Digital Extremisms [[electronic resource] ] : Readings in Violence, Radicalisation and Extremism in the Online Space / / edited by Mark Littler, Benjamin Lee
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020
Descrizione fisica 1 online resource (xiii, 268 pages)
Disciplina 363.3250956
Collana Palgrave Studies in Cybercrime and Cybersecurity
Soggetto topico Computer crimes
Criminal behavior
Police
Criminology
Research
Mass media and crime
Cybercrime
Criminal Behavior
Policing
Research Methods in Criminology
Crime and the Media
ISBN 3-030-30138-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction, Mark Lee And Benjamin Littler -- 2. Pioneers Of World Wide Web Fascism: The British Extreme Right And Web 1.0, Jackson And Jones -- 3. Cumulative Extremism And The Online Space - Reciprocal Radicalisation Effects Between The Extreme Right And Radical Islamists In The UK, Allchorn -- 4. Haters Gonna Like: Exploring Canadian Far-Right Extremism On Facebook, Scrivens And Amarasingam -- 5. Neo-Nazis Have Stolen Our Memes: Making Sense Of Extreme Memes, Benjamin Lee -- 6. Then And Now: Irish Republicanism And Ulster Loyalism Online, Bowman-Grieve And Herron -- 7. Animal Rights Extremism And The Internet, Monaghan And Mcalister -- 8. Demonic Slappers And Fascists? Exploring Extreme British Anti-Abortion Activism On Facebook, Mark Littler -- 9. Jihadi Fans Revisited: Mapping The Commonalities With Non-Islamic Extremism, Ramsay -- 10. Developing Effective And Ethical ‘Secondary’ Intervention Programmes To Counter Radicalisation And Polarisation, Birdwell -- 11. Researching The Radical Right: Making Use Of The Digital Space And Its Challenges, Carter And Kondor -- 12. Conclusion, Mark Littler and Benjamin Lee.
Record Nr. UNINA-9910373890503321
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Finance, Bits and Bytes [[electronic resource] ] : The Road Ahead / / by Vasant Chintaman Joshi
Digital Finance, Bits and Bytes [[electronic resource] ] : The Road Ahead / / by Vasant Chintaman Joshi
Autore Joshi Vasant Chintaman
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Palgrave Macmillan, , 2020
Descrizione fisica 1 online resource (224 pages)
Disciplina 332.10684
Soggetto topico Banks and banking
E-business
Electronic commerce
E-commerce
Personal finance
Pension plans
Insurance
Computer crimes
Management
Industrial management
Banking
e-Business/e-Commerce
Personal Finance/Wealth Management/Pension Planning
Cybercrime
Innovation/Technology Management
ISBN 981-15-3431-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 A Brief Review - Socio-Economic Changes -- Chapter 2 Technology Challenges – Impact Assessment -- Chapter 3 The Internet – Engine for Change -- Chapter 4 E-Insurance -- Chapter 5 E-Banking -- Chapter 6 E-Trading -- Chapter 7 Cyber Crimes and Laws -- Chapter 8 General Risk Management -- Chapter 9 Cyber Risk Management -- Chapter 10 Human Resource Management -- Chapter 11 E-Marketing -- Chapter 12 Regulating Banks and Insurance Companies -- Chapter 13 The Road Ahead.
Record Nr. UNINA-9910409674603321
Joshi Vasant Chintaman  
Singapore : , : Springer Singapore : , : Imprint : Palgrave Macmillan, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Forensic Education [[electronic resource] ] : An Experiential Learning Approach / / edited by Xiaolu Zhang, Kim-Kwang Raymond Choo
Digital Forensic Education [[electronic resource] ] : An Experiential Learning Approach / / edited by Xiaolu Zhang, Kim-Kwang Raymond Choo
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xii, 307 pages) : illustrations
Disciplina 363.25968
Collana Studies in Big Data
Soggetto topico Engineering—Data processing
Big data
Computer crimes
Computational intelligence
Artificial intelligence
Data Engineering
Big Data
Cybercrime
Computational Intelligence
Artificial Intelligence
ISBN 3-030-23547-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto DFRWS IoT Forensic Challenge -- Alexa and Google Home Forensics -- Digital Forensics of Raspberry Pi used for MITM -- Forensic Analysis on kindle and android -- Mobile forensics -- SSD Forensics Evidence Generation and Analysis -- Web Browser Forensics in Google Chrome, Mozilla Firefox, and the Tor Browser Bundle -- Web Browser Forensic Analysis of Social Dating Website Tinder -- Forensic Analysis of Microblogging Sites using Pinterest and Tumblr as Case study -- Social Media Data in Digital Forensic Investigations.
Record Nr. UNINA-9910741177803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Image Forensics [[electronic resource] ] : Theory and Implementation / / by Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty
Digital Image Forensics [[electronic resource] ] : Theory and Implementation / / by Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty
Autore Roy Aniket
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVI, 89 p. 45 illus., 32 illus. in color.)
Disciplina 363.252
Collana Studies in Computational Intelligence
Soggetto topico Signal processing
Image processing
Speech processing systems
Optical data processing
Computer crimes
Signal, Image and Speech Processing
Image Processing and Computer Vision
Cybercrime
ISBN 981-10-7644-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction -- Chapter 2: Source Camera Identification Using Statistical Features -- Chapter 3: Copy Move Forgery Detection in Digital Images – A Survey and Analysis -- Chapter 4: Copy–Move Forgery Detection exploiting Statistical Image Features -- Chapter 5: Blur-invariant Copy-move Forgery Detection utilizing SWT-SVD -- Chapter 6: Copy–Move Forgery Detection with Similar but Genuine Objects using Texture Features -- Chapter 7: Conclusions and Future Work.
Record Nr. UNINA-9910366596103321
Roy Aniket  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Ethics of Cybersecurity [[electronic resource] /] / edited by Markus Christen, Bert Gordijn, Michele Loi
The Ethics of Cybersecurity [[electronic resource] /] / edited by Markus Christen, Bert Gordijn, Michele Loi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (384)
Disciplina 601
Collana The International Library of Ethics, Law and Technology
Soggetto topico Engineering ethics
Mass media
Law
Computer crimes
Computer security
Engineering Ethics
IT Law, Media Law, Intellectual Property
Cybercrime
Privacy
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Part 1. Foundations -- Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) -- Chapter 3. Core values in Cybersecurity (Ibo van de Poel) -- Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) -- Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) -- Part 2 – Problems -- Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) -- Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) -- Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) -- Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) -- Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) -- Chapter 11. Cybersecurity and Democracy -- Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) -- Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers -- Chapter 14. Cybersecurity and the Individual -- Part 3 – Solutions -- Chapter 15. Requirements on the Policy Level to Ensure Cyberpeace -- Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) -- Chapter 17. A framework for Ethical Cyber-Defence for Companies -- Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) -- Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare -- Chapter 20. Conclusion.
Record Nr. UNINA-9910372787303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui