Cargando…

Automating open source intelligence : algorithms for OSINT /

This book presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social r...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Layton, Robert, 1986- (Editor ), Watters, Paul A. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Elsevier, [2016]
Colección:Syngress advanced topics in information security.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn931534548
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu|||unuuu
008 151207t20162016mau ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d IDEBK  |d YDXCP  |d OCLCF  |d EBLCP  |d OPELS  |d CDX  |d B24X7  |d STF  |d TXI  |d OCLCO  |d D6H  |d COO  |d IDB  |d Z5A  |d DEBSZ  |d LIV  |d OCLCQ  |d MERUC  |d OCLCQ  |d U3W  |d WRM  |d OCLCQ  |d WYU  |d LOA  |d ZCU  |d ICG  |d COCUF  |d VT2  |d DKC  |d OCLCQ  |d LQU  |d DCT  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 932340309  |a 966374388  |a 1066446830  |a 1088963499  |a 1105188018  |a 1105574061  |a 1142976503 
020 |a 9780128029176  |q (electronic bk.) 
020 |a 012802917X  |q (electronic bk.) 
020 |a 0128029161  |q (paperback) 
020 |a 9780128029169 
020 |z 9780128029169 
029 1 |a AU@  |b 000056973224 
029 1 |a AU@  |b 000062004842 
029 1 |a CHNEW  |b 001013295 
029 1 |a DEBBG  |b BV043627317 
029 1 |a DEBSZ  |b 478823134 
029 1 |a GBVCP  |b 879390476 
029 1 |a AU@  |b 000074359458 
035 |a (OCoLC)931534548  |z (OCoLC)932340309  |z (OCoLC)966374388  |z (OCoLC)1066446830  |z (OCoLC)1088963499  |z (OCoLC)1105188018  |z (OCoLC)1105574061  |z (OCoLC)1142976503 
050 4 |a JF1525.I6 
072 7 |a POL  |x 040020  |2 bisacsh 
072 7 |a POL  |x 011000  |2 bisacsh 
082 0 4 |a 327.120285/4678  |2 23 
049 |a UAMI 
245 0 0 |a Automating open source intelligence :  |b algorithms for OSINT /  |c edited by Robert Layton, Paul A. Watters. 
264 1 |a Waltham, MA :  |b Elsevier,  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Syngress advanced topics in information security 
504 |a Includes bibliographical references and index. 
588 0 |a Vendor-supplied metadata. 
505 0 |a Cover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization. 
505 8 |a Attribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 -- Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC. 
505 8 |a Comparison to Existing ApproachConclusion and future work; References; Chapter 5 -- Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 -- Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report. 
505 8 |a Mainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 -- Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques. 
505 8 |a Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction. 
520 |a This book presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. It presents a coherent set of methods and processes for automating OSINT; focuses on algorithms and applications allowing the practitioner to get up and running quickly; includes fully developed case studies on the digital underground and predicting crime through OSINT; discusses the ethical considerations when using publicly available online data. --  |c Edited summary from book. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Open source intelligence. 
650 6 |a Renseignements de sources ouvertes. 
650 7 |a POLITICAL SCIENCE  |x Government  |x International.  |2 bisacsh 
650 7 |a POLITICAL SCIENCE  |x International Relations  |x General.  |2 bisacsh 
650 7 |a Open source intelligence  |2 fast 
700 1 |a Layton, Robert,  |d 1986-  |e editor.  |1 https://id.oclc.org/worldcat/entity/E39PCjJ84RttdvpDHxQTj4kJWC 
700 1 |a Watters, Paul A.,  |e editor. 
758 |i has work:  |a Automating open source intelligence (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFFT3HTqP4Y4xDh9JHW8kC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Layton, Robert.  |t Automating Open Source Intelligence : Algorithms for OSINT.  |d : Elsevier Science, ©2015 
830 0 |a Syngress advanced topics in information security. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4186519  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00106784 
938 |a Coutts Information Services  |b COUT  |n 33327190 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4186519 
938 |a EBSCOhost  |b EBSC  |n 1106061 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis33327190 
938 |a YBP Library Services  |b YANK  |n 12745582 
994 |a 92  |b IZTAP