語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Automating open source intelligence ...
~
Layton, Robert, (1986-)
FindBook
Google Book
Amazon
博客來
Automating open source intelligence = algorithms for OSINT /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Automating open source intelligence/ edited by Robert Layton, Paul A. Watters.
其他題名:
algorithms for OSINT /
其他作者:
Layton, Robert,
出版者:
Waltham, MA :Elsevier, : 2016.,
面頁冊數:
1 online resource.
內容註:
Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.
內容註:
Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 -- Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC.
內容註:
Comparison to Existing ApproachConclusion and future work; References; Chapter 5 -- Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 -- Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report.
內容註:
Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 -- Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques.
內容註:
Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality;Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities;Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction.
標題:
Open source intelligence. -
電子資源:
https://www.sciencedirect.com/science/book/9780128029169
ISBN:
9780128029176 (electronic bk.)
Automating open source intelligence = algorithms for OSINT /
Automating open source intelligence
algorithms for OSINT /[electronic resource] :edited by Robert Layton, Paul A. Watters. - Waltham, MA :Elsevier,2016. - 1 online resource. - Syngress advanced topics in information security. - Syngress advanced topics in information security..
Includes bibliographical references and index.
Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.
This book presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. It presents a coherent set of methods and processes for automating OSINT; focuses on algorithms and applications allowing the practitioner to get up and running quickly; includes fully developed case studies on the digital underground and predicting crime through OSINT; discusses the ethical considerations when using publicly available online data. --
ISBN: 9780128029176 (electronic bk.)
LCCN: 2017288169Subjects--Topical Terms:
911920
Open source intelligence.
Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: JF1525.I6
Dewey Class. No.: 327.120285/4678
Automating open source intelligence = algorithms for OSINT /
LDR
:05016cmm a2200337 a 4500
001
2246053
006
m o d
007
cr cnu|||unuuu
008
211223s2016 maua gob 001 0 eng d
010
$a
2017288169
020
$a
9780128029176 (electronic bk.)
020
$a
012802917X (electronic bk.)
020
$a
9780128029169 (paperback)
020
$a
0128029161 (paperback)
035
$a
(OCoLC)931534548
035
$a
ocn931534548
040
$a
N$T
$b
eng
$c
N$T
$d
N$T
$d
IDEBK
$d
YDXCP
$d
OCLCF
$d
EBLCP
$d
OPELS
$d
CDX
$d
B24X7
$d
STF
$d
TXI
$d
OCLCO
$d
D6H
$d
COO
$d
IDB
$d
Z5A
$d
DEBSZ
$d
LIV
$d
OCLCQ
$d
MERUC
$d
OCLCQ
$d
U3W
$d
WRM
$d
OCLCQ
$d
WYU
$d
LOA
$d
ZCU
$d
ICG
$d
COCUF
$d
VT2
$d
DKC
$d
OCLCQ
$d
LQU
$d
DCT
041
0
$a
eng
050
4
$a
JF1525.I6
082
0 4
$a
327.120285/4678
$2
23
245
0 0
$a
Automating open source intelligence
$h
[electronic resource] :
$b
algorithms for OSINT /
$c
edited by Robert Layton, Paul A. Watters.
260
$a
Waltham, MA :
$b
Elsevier,
$c
2016.
300
$a
1 online resource.
490
1
$a
Syngress advanced topics in information security
504
$a
Includes bibliographical references and index.
505
0
$a
Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.
505
8
$a
Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 -- Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC.
505
8
$a
Comparison to Existing ApproachConclusion and future work; References; Chapter 5 -- Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 -- Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report.
505
8
$a
Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 -- Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques.
505
8
$a
Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality;Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities;Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction.
520
$a
This book presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. It presents a coherent set of methods and processes for automating OSINT; focuses on algorithms and applications allowing the practitioner to get up and running quickly; includes fully developed case studies on the digital underground and predicting crime through OSINT; discusses the ethical considerations when using publicly available online data. --
$c
Edited summary from book.
650
0
$a
Open source intelligence.
$3
911920
650
7
$a
POLITICAL SCIENCE
$x
Government
$x
International.
$2
bisacsh
$3
1598303
650
7
$a
POLITICAL SCIENCE
$x
International Relations
$x
General.
$2
bisacsh
$3
1598384
655
0
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Layton, Robert,
$d
1986-
$e
editor.
$3
3509004
700
1
$a
Watters, Paul A.,
$e
editor.
$3
3509005
830
0
$a
Syngress advanced topics in information security.
$3
3235626
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128029169
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9406548
電子資源
11.線上閱覽_V
電子書
EB JF1525.I6
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入