Automating open source intelligence ...
Layton, Robert, (1986-)

FindBook      Google Book      Amazon      博客來     
  • Automating open source intelligence = algorithms for OSINT /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Automating open source intelligence/ edited by Robert Layton, Paul A. Watters.
    其他題名: algorithms for OSINT /
    其他作者: Layton, Robert,
    出版者: Waltham, MA :Elsevier, : 2016.,
    面頁冊數: 1 online resource.
    內容註: Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.
    內容註: Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 -- Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC.
    內容註: Comparison to Existing ApproachConclusion and future work; References; Chapter 5 -- Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 -- Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report.
    內容註: Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 -- Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques.
    內容註: Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality;Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities;Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction.
    標題: Open source intelligence. -
    電子資源: https://www.sciencedirect.com/science/book/9780128029169
    ISBN: 9780128029176 (electronic bk.)
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入