Automating open source intelligence ...
Layton, Robert, (1986-)

Linked to FindBook      Google Book      Amazon      博客來     
  • Automating open source intelligence = algorithms for OSINT /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Automating open source intelligence/ edited by Robert Layton, Paul A. Watters.
    Reminder of title: algorithms for OSINT /
    other author: Layton, Robert,
    Published: Waltham, MA :Elsevier, : 2016.,
    Description: 1 online resource.
    [NT 15003449]: Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.
    [NT 15003449]: Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 -- Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC.
    [NT 15003449]: Comparison to Existing ApproachConclusion and future work; References; Chapter 5 -- Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 -- Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report.
    [NT 15003449]: Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 -- Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques.
    [NT 15003449]: Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality;Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities;Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction.
    Subject: Open source intelligence. -
    Online resource: https://www.sciencedirect.com/science/book/9780128029169
    ISBN: 9780128029176 (electronic bk.)
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login