語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Handbook of research on cyber crime ...
~
Cruz-Cunha, Maria Manuela, (1964-)
Handbook of research on cyber crime and information privacy
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Handbook of research on cyber crime and information privacy/ Maria Manuela Cruz-Cunha and Nuno Ricardo Mateus-Coelho, editors.
其他作者:
Mateus-Coelho, Nuno Ricardo,
出版者:
Hershey, Pennsylvania :IGI Global, : 2021.,
面頁冊數:
1 online resource (xxix, 753 p.)
標題:
Privacy, Right of. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-5728-0
ISBN:
9781799857297 (ebk.)
Handbook of research on cyber crime and information privacy
Handbook of research on cyber crime and information privacy
[electronic resource] /Maria Manuela Cruz-Cunha and Nuno Ricardo Mateus-Coelho, editors. - Hershey, Pennsylvania :IGI Global,2021. - 1 online resource (xxix, 753 p.)
Includes bibliographical references and index.
Chapter 1. A black-box framework for malicious traffic detection in ICT environments -- Chapter 2. A survey of KYC/AML for cryptocurrencies transactions -- Chapter 3. A survey of methodologies for protecting privacy of user data within enterprise information infrastructure -- Chapter 4. An experimental analysis on detection of corona virus malware attacks and its preventive measures -- Chapter 5. An overview of recent development in privacy regulations and future research opportunities -- Chapter 6. An overview on protecting user private-attribute information on social networks -- Chapter 7. Challenges to multimedia privacy and security over social media -- Chapter 8. Computer forensics and cyber attacks -- Chapter 9. Contextual anomaly detection methods for addressing intrusion detection -- Chapter 10. Cyberbullying from a research viewpoint: a bibliometric approach -- Chapter 11. Detection and prediction of spam emails using machine learning models -- Chapter 12. Evolving cyber threats, combating techniques, and open issues in online social networks -- Chapter 13. Forensic readiness for enhanced ediscovery -- Chapter 14. Mobile device forensics investigation process: a systematic review -- Chapter 15. Fuzzy rule-based layered classifier and entropy-based feature selection for intrusion detection system -- Chapter 16. Hybrid intelligence framework for improvement of information security of critical infrastructures -- Chapter 17. Implementing information security using multimodal biometrics -- Chapter 18. Interdisciplinary training and mentoring for cyber security in companies -- Chapter 19. Learning with differential privacy -- Chapter 20. Limitation of COTS antiviruses: issues, controversies, and problems of COTS antiviruses -- Chapter 21. Modeling a cyber defense business ecosystem of ecosystems: nurturing Brazilian cyber defense resources -- Chapter 22. Oblivion is full of memory: legal issues raised in the EU by the right to erasure -- Chapter 23. Posmasweb: paranoid operating system methodology for anonymous and secure web browsing -- Chapter 24. Practical align overview of the main frameworks used by the companies to prevent cyber incidents -- Chapter 25. Prediction, detection, and mitigation of DDoS attacks using hpcs: design for a safer adaptive infrastructure -- Chapter 26. Preserving information security using fractal-based cryptosystem -- Chapter 27. Privacy in online social networks: threat analysis and countermeasures -- Chapter 28. Self-driving robotic cars: cyber security developments -- Chapter 29. Statistical methods for conducting the ontology and classifications of fake news on social media -- Chapter 30. Stuxnet-tool for zero-day attack -- Chapter 31. The intersection of cybercrime and the blockchain -- Chapter 32. User authentication into electronic health record based on reliable lightweight algorithms -- Chapter 33. Detecting the risk of online harms on people with social orientation impairments: the role of automated affective content screening of neuro-response plasticity.
"This book contains research on cyber-crime activities and approaches, developments, and practical examples of cyberspace security, personal and global privacy, information assurance, information protection, and ICT Law"--
ISBN: 9781799857297 (ebk.)Subjects--Topical Terms:
566424
Privacy, Right of.
LC Class. No.: HV6773 / .H36 2021
Dewey Class. No.: 364.16/8
Handbook of research on cyber crime and information privacy
LDR
:04189nam a2200253 a 4500
001
1041446
003
IGIG
005
20211027155715.0
006
m o d
007
cr cn
008
211215s2021 pau fob 001 0 eng d
020
$a
9781799857297 (ebk.)
020
$a
9781799857280 (hbk.)
035
$a
(OCoLC)1193106484
035
$a
1101012317
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
HV6773
$b
.H36 2021
082
0 0
$a
364.16/8
$2
23
245
0 0
$a
Handbook of research on cyber crime and information privacy
$h
[electronic resource] /
$c
Maria Manuela Cruz-Cunha and Nuno Ricardo Mateus-Coelho, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2021.
300
$a
1 online resource (xxix, 753 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. A black-box framework for malicious traffic detection in ICT environments -- Chapter 2. A survey of KYC/AML for cryptocurrencies transactions -- Chapter 3. A survey of methodologies for protecting privacy of user data within enterprise information infrastructure -- Chapter 4. An experimental analysis on detection of corona virus malware attacks and its preventive measures -- Chapter 5. An overview of recent development in privacy regulations and future research opportunities -- Chapter 6. An overview on protecting user private-attribute information on social networks -- Chapter 7. Challenges to multimedia privacy and security over social media -- Chapter 8. Computer forensics and cyber attacks -- Chapter 9. Contextual anomaly detection methods for addressing intrusion detection -- Chapter 10. Cyberbullying from a research viewpoint: a bibliometric approach -- Chapter 11. Detection and prediction of spam emails using machine learning models -- Chapter 12. Evolving cyber threats, combating techniques, and open issues in online social networks -- Chapter 13. Forensic readiness for enhanced ediscovery -- Chapter 14. Mobile device forensics investigation process: a systematic review -- Chapter 15. Fuzzy rule-based layered classifier and entropy-based feature selection for intrusion detection system -- Chapter 16. Hybrid intelligence framework for improvement of information security of critical infrastructures -- Chapter 17. Implementing information security using multimodal biometrics -- Chapter 18. Interdisciplinary training and mentoring for cyber security in companies -- Chapter 19. Learning with differential privacy -- Chapter 20. Limitation of COTS antiviruses: issues, controversies, and problems of COTS antiviruses -- Chapter 21. Modeling a cyber defense business ecosystem of ecosystems: nurturing Brazilian cyber defense resources -- Chapter 22. Oblivion is full of memory: legal issues raised in the EU by the right to erasure -- Chapter 23. Posmasweb: paranoid operating system methodology for anonymous and secure web browsing -- Chapter 24. Practical align overview of the main frameworks used by the companies to prevent cyber incidents -- Chapter 25. Prediction, detection, and mitigation of DDoS attacks using hpcs: design for a safer adaptive infrastructure -- Chapter 26. Preserving information security using fractal-based cryptosystem -- Chapter 27. Privacy in online social networks: threat analysis and countermeasures -- Chapter 28. Self-driving robotic cars: cyber security developments -- Chapter 29. Statistical methods for conducting the ontology and classifications of fake news on social media -- Chapter 30. Stuxnet-tool for zero-day attack -- Chapter 31. The intersection of cybercrime and the blockchain -- Chapter 32. User authentication into electronic health record based on reliable lightweight algorithms -- Chapter 33. Detecting the risk of online harms on people with social orientation impairments: the role of automated affective content screening of neuro-response plasticity.
520
3
$a
"This book contains research on cyber-crime activities and approaches, developments, and practical examples of cyberspace security, personal and global privacy, information assurance, information protection, and ICT Law"--
$c
Provided by publisher.
650
0
$a
Privacy, Right of.
$3
566424
650
0
$a
Computer security.
$3
557122
650
0
$a
Computer crimes.
$3
564161
700
1
$a
Mateus-Coelho, Nuno Ricardo,
$d
1981-
$3
1340962
700
1
$a
Cruz-Cunha, Maria Manuela,
$d
1964-
$3
805204
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-5728-0
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入