Automating open source intelligence
algorithms for OSINT
Gespeichert in:
Verfasser / Beitragende:
edited by Robert Layton, Paul A. Watters
Ort, Verlag, Jahr:
Amsterdam, Boston :
Elsevier/Syngress,
2016
Beschreibung:
1 online resource (x, 211 pages) : illustrations
Format:
Buch (online)
Online Zugang:
| LEADER | cam a22 4500 | ||
|---|---|---|---|
| 001 | 528871129 | ||
| 003 | CHVBK | ||
| 005 | 20201014111126.0 | ||
| 006 | m d | ||
| 007 | cr |n |||||||| | ||
| 008 | 170308s2016 ne a sb 001 0 eng d | ||
| 010 | |a 2017288169 | ||
| 020 | |a 978-0-12-802916-9 |q (paperback) | ||
| 020 | |a 0-12-802916-1 |q (paperback) | ||
| 020 | |z 978-0-12-802917-6 (PDF ebook) | ||
| 035 | |a (SERSOL)ssj0001777174 | ||
| 035 | |a (WaSeSS)ssj0001777174 | ||
| 040 | |a VYR |b eng |c VYR |d OCLCO |d OCLCQ |d YDXCP |d BTCTA |d MUU |d OCLCF |d CDX |d BDX |d IG$ |d AU@ |d DLC |d WaSeSS |e rda | ||
| 050 | 0 | 0 | |a JF1525.I6 |b A88 2016 |
| 245 | 0 | 0 | |a Automating open source intelligence |b algorithms for OSINT |c edited by Robert Layton, Paul A. Watters |
| 264 | 1 | |a Amsterdam |a Boston |b Elsevier/Syngress |c [2016] | |
| 264 | 4 | |c ©2016 | |
| 300 | |a 1 online resource (x, 211 pages) |b illustrations | ||
| 336 | |a text |b txt |2 rdacontent/eng | ||
| 337 | |a computer |b c |2 rdamedia/eng | ||
| 338 | |a online resource |b cr |2 rdacarrier/eng | ||
| 490 | 0 | |a Syngress Advanced Topics in Information Security | |
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Machine generated contents note: ch. 1 The Automating of Open Source Intelligence / Agate M. Ponder-Sutton -- The commercial angle -- Algorithms -- References -- ch. 2 Named Entity Resolution in Social Media / Paul A. Watters -- Introduction -- Discussion -- References -- ch. 3 Relative Cyberattack Attribution / Robert Layton -- Introduction -- Basic attack structure -- Anonymization on the internet -- Weaknesses in anonymization -- Attribution as a concept -- Absolute attribution -- Relative attribution -- Relative attribution concepts -- Inherent versus learnt behaviors -- Hiding behavior -- Consistency of behavior -- Relative attribution techniques -- Authorship analysis -- Limitations and issues -- Research streams -- Conclusions -- References -- ch. 4 Enhancing Privacy to Defeat Open Source Intelligence / Jason Smith -- Introduction -- Requirements and threats -- Preliminaries -- The PIEMCP -- Formal security analysis with CPN -- Performance analysis of FSSO-PIEMC -- | |
| 505 | 0 | |a Note continued: Conclusion and future work -- References -- ch. 5 Preventing Data Exfiltration: Corporate Patterns and Practices / Brenda Chawner -- What is happening around the world? -- What is happening in New Zealand? -- Specifying the problem -- Problems arising by implementing censorship -- So, what should be done? -- Summary -- References -- ch. 6 Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground / Paul A. Watters -- Introduction -- Advertising and risk -- The digital millennium copyright act (DMCA) -- Chilling effects database -- Google transparency report -- Mainstream advertising and how piracy is funded -- High-risk advertising and their links to piracy websites -- High-risk advertising: Case studies in Canada -- High-risk advertising: Case studies in Australia -- High-risk advertising: Case studies in New Zealand -- Research challenges -- References -- | |
| 505 | 0 | |a Note continued: ch. 7 Graph Creation and Analysis for Linking Actors: Application to Social Data / Rony Germon -- Introduction -- The social network model -- Graph creation techniques -- Graph analysis for OSINT -- Twitter case study -- Conclusion -- References -- ch. 8 Ethical Considerations When Using Online Datasets for Research Purposes / Jim Sillitoe -- Introduction -- Existing guidelines -- Interpretation of existing guidelines for online purposes -- The three proposed principles applied to online research -- Autonomy -- Obtaining consent -- Benefits against risks -- Justice -- Summary -- References -- ch. 9 The Limitations of Automating OSINT: Understanding the Question, Not the Answer / George R.S. Weir -- Introduction -- Finding answers to questions -- Credibility and the quality of results -- Relevance -- The limitations of automating osint -- Conclusions -- References -- ch. 10 Geospatial Reasoning With Open Data / Hans Guesgen -- Introduction -- | |
| 505 | 0 | |a Note continued: The open geospatial data environment -- Review of reasoning methods with geospatial data -- Case studies in geospatial reasoning -- Conclusions -- References. | |
| 506 | |a Lizenzbedingungen können den Zugang einschränken. License restrictions may limit access. | ||
| 650 | 0 | |a Open source intelligence |x Data processing | |
| 650 | 0 | |a Intelligence service |x Technological innovations | |
| 700 | 1 | |a Layton |D Robert |d 1986- |e editor | |
| 700 | 1 | |a Watters |D Paul A. |e editor | |
| 856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/unibern/detail.action?docID=4186519 |z Uni Bern: Volltext |
| 898 | |a BK020053 |b XK020053 |c XK020000 | ||
| 909 | 4 | |f Ebook Central All Subscribed Titles | |
| 909 | 4 | |a E-Books von 360MarcUpdates | |
| 949 | |B IDSBB |F B405 |b B405 |c 405VT |x NELB4051809 | ||
| 950 | |B IDSBB |P 490 |E 0- |a Syngress Advanced Topics in Information Security | ||
| 950 | |B IDSBB |P 700 |E 1- |a Layton |D Robert |d 1986- |e editor | ||
| 950 | |B IDSBB |P 700 |E 1- |a Watters |D Paul A. |e editor | ||
| 950 | |B IDSBB |P 856 |E 40 |u https://ebookcentral.proquest.com/lib/unibern/detail.action?docID=4186519 |z Uni Bern: Volltext | ||
| 986 | |a SWISSBIB |b 528871129 | ||