My Account Log in

1 option

Handbook of research on cyber crime and information privacy / Maria Manuela Cruz-Cunha and Nuno Ricardo Mateus-Coelho, editors.

EBSCOhost Academic eBook Collection (North America) Available online

View online
Format:
Book
Author/Creator:
Cruz-Cunha, Maria Manuela, 1964- author.
Contributor:
Cruz-Cunha, Maria Manuela, 1964- editor.
Mateus-Coelho, Nuno Ricardo, 1981- editor.
Language:
English
Subjects (All):
Computer crimes.
Computer security.
Privacy, Right of.
Physical Description:
41 PDFs (2 volumes (753 pages))
Place of Publication:
Hershey, Pennsylvania : IGI Global, [2021]
System Details:
Mode of access: World Wide Web.
Summary:
"This book contains research on cyber-crime activities and approaches, developments, and practical examples of cyberspace security, personal and global privacy, information assurance, information protection, and ICT Law"-- Provided by publisher.
Contents:
Chapter 1. A black-box framework for malicious traffic detection in ICT environments
Chapter 2. A survey of KYC/AML for cryptocurrencies transactions
Chapter 3. A survey of methodologies for protecting privacy of user data within enterprise information infrastructure
Chapter 4. An experimental analysis on detection of corona virus malware attacks and its preventive measures
Chapter 5. An overview of recent development in privacy regulations and future research opportunities
Chapter 6. An overview on protecting user private-attribute information on social networks
Chapter 7. Challenges to multimedia privacy and security over social media
Chapter 8. Computer forensics and cyber attacks
Chapter 9. Contextual anomaly detection methods for addressing intrusion detection
Chapter 10. Cyberbullying from a research viewpoint: a bibliometric approach
Chapter 11. Detection and prediction of spam emails using machine learning models
Chapter 12. Evolving cyber threats, combating techniques, and open issues in online social networks
Chapter 13. Forensic readiness for enhanced ediscovery
Chapter 14. Mobile device forensics investigation process: a systematic review
Chapter 15. Fuzzy rule-based layered classifier and entropy-based feature selection for intrusion detection system
Chapter 16. Hybrid intelligence framework for improvement of information security of critical infrastructures
Chapter 17. Implementing information security using multimodal biometrics
Chapter 18. Interdisciplinary training and mentoring for cyber security in companies
Chapter 19. Learning with differential privacy
Chapter 20. Limitation of COTS antiviruses: issues, controversies, and problems of COTS antiviruses
Chapter 21. Modeling a cyber defense business ecosystem of ecosystems: nurturing Brazilian cyber defense resources
Chapter 22. Oblivion is full of memory: legal issues raised in the EU by the right to erasure
Chapter 23. Posmasweb: paranoid operating system methodology for anonymous and secure web browsing
Chapter 24. Practical align overview of the main frameworks used by the companies to prevent cyber incidents
Chapter 25. Prediction, detection, and mitigation of DDoS attacks using hpcs: design for a safer adaptive infrastructure
Chapter 26. Preserving information security using fractal-based cryptosystem
Chapter 27. Privacy in online social networks: threat analysis and countermeasures
Chapter 28. Self-driving robotic cars: cyber security developments
Chapter 29. Statistical methods for conducting the ontology and classifications of fake news on social media
Chapter 30. Stuxnet-tool for zero-day attack
Chapter 31. The intersection of cybercrime and the blockchain
Chapter 32. User authentication into electronic health record based on reliable lightweight algorithms
Chapter 33. Detecting the risk of online harms on people with social orientation impairments: the role of automated affective content screening of neuro-response plasticity.
Notes:
Description based on print version record.
Includes bibliographical references and index.
ISBN:
1-7998-5729-8
OCLC:
1193106484

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account