000 | 03593cam a2200217 i 4500 | ||
---|---|---|---|
999 |
_c16203 _d16203 |
||
020 | _a9780128029169 | ||
020 | _a0128029161 | ||
082 | _a327.12028 | ||
245 | 0 | 0 | _aAutomating open source intelligence : |
300 |
_ax, 211 pages : _billustrations ; |
||
490 | 0 | _aSyngress Advanced Topics in Information Security | |
505 | 0 | _aMachine generated contents note: ch. 1 The Automating of Open Source Intelligence / Agate M. Ponder-Sutton -- The commercial angle -- Algorithms -- References -- ch. 2 Named Entity Resolution in Social Media / Paul A. Watters -- Introduction -- Discussion -- References -- ch. 3 Relative Cyberattack Attribution / Robert Layton -- Introduction -- Basic attack structure -- Anonymization on the internet -- Weaknesses in anonymization -- Attribution as a concept -- Absolute attribution -- Relative attribution -- Relative attribution concepts -- Inherent versus learnt behaviors -- Hiding behavior -- Consistency of behavior -- Relative attribution techniques -- Authorship analysis -- Limitations and issues -- Research streams -- Conclusions -- References -- ch. 4 Enhancing Privacy to Defeat Open Source Intelligence / Jason Smith -- Introduction -- Requirements and threats -- Preliminaries -- The PIEMCP -- Formal security analysis with CPN -- Performance analysis of FSSO-PIEMC -- | |
505 | 0 | _aNote continued: Conclusion and future work -- References -- ch. 5 Preventing Data Exfiltration: Corporate Patterns and Practices / Brenda Chawner -- What is happening around the world? -- What is happening in New Zealand? -- Specifying the problem -- Problems arising by implementing censorship -- So, what should be done? -- Summary -- References -- ch. 6 Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground / Paul A. Watters -- Introduction -- Advertising and risk -- The digital millennium copyright act (DMCA) -- Chilling effects database -- Google transparency report -- Mainstream advertising and how piracy is funded -- High-risk advertising and their links to piracy websites -- High-risk advertising: Case studies in Canada -- High-risk advertising: Case studies in Australia -- High-risk advertising: Case studies in New Zealand -- Research challenges -- References -- | |
505 | 0 | _aNote continued: ch. 7 Graph Creation and Analysis for Linking Actors: Application to Social Data / Rony Germon -- Introduction -- The social network model -- Graph creation techniques -- Graph analysis for OSINT -- Twitter case study -- Conclusion -- References -- ch. 8 Ethical Considerations When Using Online Datasets for Research Purposes / Jim Sillitoe -- Introduction -- Existing guidelines -- Interpretation of existing guidelines for online purposes -- The three proposed principles applied to online research -- Autonomy -- Obtaining consent -- Benefits against risks -- Justice -- Summary -- References -- ch. 9 The Limitations of Automating OSINT: Understanding the Question, Not the Answer / George R.S. Weir -- Introduction -- Finding answers to questions -- Credibility and the quality of results -- Relevance -- The limitations of automating osint -- Conclusions -- References -- ch. 10 Geospatial Reasoning With Open Data / Hans Guesgen -- Introduction -- | |
505 | 0 | _aNote continued: The open geospatial data environment -- Review of reasoning methods with geospatial data -- Case studies in geospatial reasoning -- Conclusions -- References. | |
650 | 0 | _aOpen source intelligence | |
650 | 0 | _aIntelligence service | |
700 | 1 | _aLayton, Robert, | |
700 | 1 | _aWatters, Paul A., | |
942 | _cBK |