Automating open source intelligence

algorithms for OSINT

Verfasser / Beitragende:
edited by Robert Layton, Paul A. Watters
Ort, Verlag, Jahr:
Amsterdam, Boston : Elsevier/Syngress, 2016
Beschreibung:
1 online resource (x, 211 pages) : illustrations
Format:
Buch (online)
Online Zugang:
ID: 528871129
LEADER cam a22 4500
001 528871129
003 CHVBK
005 20201014111126.0
006 m d
007 cr |n ||||||||
008 170308s2016 ne a sb 001 0 eng d
010 |a  2017288169 
020 |a 978-0-12-802916-9  |q (paperback) 
020 |a 0-12-802916-1  |q (paperback) 
020 |z 978-0-12-802917-6 (PDF ebook) 
035 |a (SERSOL)ssj0001777174 
035 |a (WaSeSS)ssj0001777174 
040 |a VYR  |b eng  |c VYR  |d OCLCO  |d OCLCQ  |d YDXCP  |d BTCTA  |d MUU  |d OCLCF  |d CDX  |d BDX  |d IG$  |d AU@  |d DLC  |d WaSeSS  |e rda 
050 0 0 |a JF1525.I6  |b A88 2016 
245 0 0 |a Automating open source intelligence  |b algorithms for OSINT  |c edited by Robert Layton, Paul A. Watters 
264 1 |a Amsterdam  |a Boston  |b Elsevier/Syngress  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource (x, 211 pages)  |b illustrations 
336 |a text  |b txt  |2 rdacontent/eng 
337 |a computer  |b c  |2 rdamedia/eng 
338 |a online resource  |b cr  |2 rdacarrier/eng 
490 0 |a Syngress Advanced Topics in Information Security 
504 |a Includes bibliographical references and index. 
505 0 |a Machine generated contents note: ch. 1 The Automating of Open Source Intelligence / Agate M. Ponder-Sutton -- The commercial angle -- Algorithms -- References -- ch. 2 Named Entity Resolution in Social Media / Paul A. Watters -- Introduction -- Discussion -- References -- ch. 3 Relative Cyberattack Attribution / Robert Layton -- Introduction -- Basic attack structure -- Anonymization on the internet -- Weaknesses in anonymization -- Attribution as a concept -- Absolute attribution -- Relative attribution -- Relative attribution concepts -- Inherent versus learnt behaviors -- Hiding behavior -- Consistency of behavior -- Relative attribution techniques -- Authorship analysis -- Limitations and issues -- Research streams -- Conclusions -- References -- ch. 4 Enhancing Privacy to Defeat Open Source Intelligence / Jason Smith -- Introduction -- Requirements and threats -- Preliminaries -- The PIEMCP -- Formal security analysis with CPN -- Performance analysis of FSSO-PIEMC -- 
505 0 |a Note continued: Conclusion and future work -- References -- ch. 5 Preventing Data Exfiltration: Corporate Patterns and Practices / Brenda Chawner -- What is happening around the world? -- What is happening in New Zealand? -- Specifying the problem -- Problems arising by implementing censorship -- So, what should be done? -- Summary -- References -- ch. 6 Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground / Paul A. Watters -- Introduction -- Advertising and risk -- The digital millennium copyright act (DMCA) -- Chilling effects database -- Google transparency report -- Mainstream advertising and how piracy is funded -- High-risk advertising and their links to piracy websites -- High-risk advertising: Case studies in Canada -- High-risk advertising: Case studies in Australia -- High-risk advertising: Case studies in New Zealand -- Research challenges -- References -- 
505 0 |a Note continued: ch. 7 Graph Creation and Analysis for Linking Actors: Application to Social Data / Rony Germon -- Introduction -- The social network model -- Graph creation techniques -- Graph analysis for OSINT -- Twitter case study -- Conclusion -- References -- ch. 8 Ethical Considerations When Using Online Datasets for Research Purposes / Jim Sillitoe -- Introduction -- Existing guidelines -- Interpretation of existing guidelines for online purposes -- The three proposed principles applied to online research -- Autonomy -- Obtaining consent -- Benefits against risks -- Justice -- Summary -- References -- ch. 9 The Limitations of Automating OSINT: Understanding the Question, Not the Answer / George R.S. Weir -- Introduction -- Finding answers to questions -- Credibility and the quality of results -- Relevance -- The limitations of automating osint -- Conclusions -- References -- ch. 10 Geospatial Reasoning With Open Data / Hans Guesgen -- Introduction -- 
505 0 |a Note continued: The open geospatial data environment -- Review of reasoning methods with geospatial data -- Case studies in geospatial reasoning -- Conclusions -- References. 
506 |a Lizenzbedingungen können den Zugang einschränken. License restrictions may limit access. 
650 0 |a Open source intelligence  |x Data processing 
650 0 |a Intelligence service  |x Technological innovations 
700 1 |a Layton  |D Robert  |d 1986-  |e editor 
700 1 |a Watters  |D Paul A.  |e editor 
856 4 0 |u https://ebookcentral.proquest.com/lib/unibern/detail.action?docID=4186519  |z Uni Bern: Volltext 
898 |a BK020053  |b XK020053  |c XK020000 
909 4 |f Ebook Central All Subscribed Titles 
909 4 |a E-Books von 360MarcUpdates 
949 |B IDSBB  |F B405  |b B405  |c 405VT  |x NELB4051809 
950 |B IDSBB  |P 490  |E 0-  |a Syngress Advanced Topics in Information Security 
950 |B IDSBB  |P 700  |E 1-  |a Layton  |D Robert  |d 1986-  |e editor 
950 |B IDSBB  |P 700  |E 1-  |a Watters  |D Paul A.  |e editor 
950 |B IDSBB  |P 856  |E 40  |u https://ebookcentral.proquest.com/lib/unibern/detail.action?docID=4186519  |z Uni Bern: Volltext 
986 |a SWISSBIB  |b 528871129