1 option
Handbook of research on cyber crime and information privacy / Maria Manuela Cruz-Cunha and Nuno Ricardo Mateus-Coelho, editors.
- Format:
- Book
- Author/Creator:
- Cruz-Cunha, Maria Manuela, 1964- author.
- Language:
- English
- Subjects (All):
- Computer crimes.
- Computer security.
- Privacy, Right of.
- Physical Description:
- 41 PDFs (2 volumes (753 pages))
- Place of Publication:
- Hershey, Pennsylvania : IGI Global, [2021]
- System Details:
- Mode of access: World Wide Web.
- Summary:
- "This book contains research on cyber-crime activities and approaches, developments, and practical examples of cyberspace security, personal and global privacy, information assurance, information protection, and ICT Law"-- Provided by publisher.
- Contents:
- Chapter 1. A black-box framework for malicious traffic detection in ICT environments
- Chapter 2. A survey of KYC/AML for cryptocurrencies transactions
- Chapter 3. A survey of methodologies for protecting privacy of user data within enterprise information infrastructure
- Chapter 4. An experimental analysis on detection of corona virus malware attacks and its preventive measures
- Chapter 5. An overview of recent development in privacy regulations and future research opportunities
- Chapter 6. An overview on protecting user private-attribute information on social networks
- Chapter 7. Challenges to multimedia privacy and security over social media
- Chapter 8. Computer forensics and cyber attacks
- Chapter 9. Contextual anomaly detection methods for addressing intrusion detection
- Chapter 10. Cyberbullying from a research viewpoint: a bibliometric approach
- Chapter 11. Detection and prediction of spam emails using machine learning models
- Chapter 12. Evolving cyber threats, combating techniques, and open issues in online social networks
- Chapter 13. Forensic readiness for enhanced ediscovery
- Chapter 14. Mobile device forensics investigation process: a systematic review
- Chapter 15. Fuzzy rule-based layered classifier and entropy-based feature selection for intrusion detection system
- Chapter 16. Hybrid intelligence framework for improvement of information security of critical infrastructures
- Chapter 17. Implementing information security using multimodal biometrics
- Chapter 18. Interdisciplinary training and mentoring for cyber security in companies
- Chapter 19. Learning with differential privacy
- Chapter 20. Limitation of COTS antiviruses: issues, controversies, and problems of COTS antiviruses
- Chapter 21. Modeling a cyber defense business ecosystem of ecosystems: nurturing Brazilian cyber defense resources
- Chapter 22. Oblivion is full of memory: legal issues raised in the EU by the right to erasure
- Chapter 23. Posmasweb: paranoid operating system methodology for anonymous and secure web browsing
- Chapter 24. Practical align overview of the main frameworks used by the companies to prevent cyber incidents
- Chapter 25. Prediction, detection, and mitigation of DDoS attacks using hpcs: design for a safer adaptive infrastructure
- Chapter 26. Preserving information security using fractal-based cryptosystem
- Chapter 27. Privacy in online social networks: threat analysis and countermeasures
- Chapter 28. Self-driving robotic cars: cyber security developments
- Chapter 29. Statistical methods for conducting the ontology and classifications of fake news on social media
- Chapter 30. Stuxnet-tool for zero-day attack
- Chapter 31. The intersection of cybercrime and the blockchain
- Chapter 32. User authentication into electronic health record based on reliable lightweight algorithms
- Chapter 33. Detecting the risk of online harms on people with social orientation impairments: the role of automated affective content screening of neuro-response plasticity.
- Notes:
- Description based on print version record.
- Includes bibliographical references and index.
- ISBN:
- 1-7998-5729-8
- OCLC:
- 1193106484
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.