Open source intelligence and cyber crime: social media analytics
This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected. Readers will encounter the latest advances in cutting-edge data mining, machine learning and predictive analytics com...
Contributors: | ; ; |
---|---|
Format: | Electronic/Print Book |
Language: | English |
Published: |
Cham
Springer
[2020]
|
In: | Year: 2020 |
Online Access: |
Table of Contents Blurb Volltext (doi) |
Availability in Tübingen: | Present in Tübingen. UB: KB 21 A 901 |
Check availability: | HBZ Gateway |
Keywords: | |
Related Items: | Erscheint auch als:
1726030512 |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 1727432193 | ||
003 | DE-627 | ||
005 | 20240629123734.0 | ||
007 | tu | ||
008 | 200819s2020 xx ||||| 00| ||eng c | ||
020 | |a 9783030412500 |9 978-3-030-41250-0 | ||
020 | |a 9783030412531 |9 978-3-030-41253-1 | ||
024 | 3 | |a 9783030412500 | |
024 | 7 | |a 10.1007/978-3-030-41251-7 |2 doi | |
035 | |a (DE-627)1727432193 | ||
035 | |a (DE-599)BVBBV046711805 | ||
035 | |a (OCoLC)1190873636 | ||
035 | |a (DE-604)BV046711805 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |q SEPA |2 23 | |
084 | |a 2,1 |2 ssgn | ||
084 | |a ST 277 |q DE-Ofb1/21 |2 rvk |0 (DE-625)rvk/143643: | ||
245 | 1 | 0 | |a Open source intelligence and cyber crime |b social media analytics |c Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn, editors |
264 | 1 | |a Cham |b Springer |c [2020] | |
300 | |a v, 251 Seiten |b Illustrationen, Diagramme |c 235 mm | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
490 | 0 | |a Lecture notes in social networks | |
500 | |a This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected. Readers will encounter the latest advances in cutting-edge data mining, machine learning and predictive analytics combined with natural language processing and social network analysis to detect, disrupt, and neutralize cyber and physical threats. Chapters contain state-of-the-art social media analytics and open source intelligence research trends. This multidisciplinary volume will appeal to students, researchers, and professionals working in the fields of open source intelligence, cyber crime and social network analytics.Chapter Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com | ||
500 | |a Chapter1. Studying the Weaponization of Social Media: Case Studies of Anti-NATO Disinformation Campaigns.- Chapter2. Cognitively-Inspired Inference for Malware Task Indentation.- Chapter3. Beyond the ‘Silk Road’: Assessing Illicit Drug Marketplaces on the Public Web.- Chapter4. Protecting the Web from Misinformation.- Chapter5. Social Media for Mental Health: Data, Methods, and Findings.- Chapter6. Twitter Bots and the Swedish Election.- Chapter7. Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study.- Chapter8. You are Known by Your Friends: Leveraging Network Metrics for Bot Detection in Twitter.- Chapter9. Inferring Systemic Nets with Applications to Islamist Forums | ||
520 | |a This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected. Readers will encounter the latest advances in cutting-edge data mining, machine learning and predictive analytics combined with natural language processing and social network analysis to detect, disrupt, and neutralize cyber and physical threats. Chapters contain state-of-the-art social media analytics and open source intelligence research trends. This multidisciplinary volume will appeal to students, researchers, and professionals working in the fields of open source intelligence, cyber crime and social network analytics.Chapter Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f SSG |x XA-DE-BW |2 pdager |5 DE-21 | |
655 | 7 | |a Aufsatzsammlung |0 (DE-588)4143413-4 |0 (DE-627)105605727 |0 (DE-576)209726091 |2 gnd-content | |
689 | 0 | 0 | |d s |0 (DE-588)4548264-0 |0 (DE-627)270783016 |0 (DE-576)21357795X |a Open Source |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4072803-1 |0 (DE-627)106094203 |0 (DE-576)209188227 |a Information Retrieval |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)4428654-5 |0 (DE-627)216935180 |0 (DE-576)212347217 |a Data Mining |2 gnd |
689 | 0 | 3 | |d s |0 (DE-588)4205975-6 |0 (DE-627)104789220 |0 (DE-576)210172304 |a Netzwerkanalyse |g Soziologie |2 gnd |
689 | 0 | 4 | |d s |0 (DE-588)7864395-8 |0 (DE-627)700634487 |0 (DE-576)363213635 |a Internetkriminalität |2 gnd |
689 | 0 | 5 | |d s |0 (DE-588)4112701-8 |0 (DE-627)104321679 |0 (DE-576)209470127 |a Bekämpfung |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Tayebi, Mohammad A. |e HerausgeberIn |0 (DE-588)1122442017 |0 (DE-627)875668917 |0 (DE-576)478582080 |4 edt | |
700 | 1 | |a Glässer, Uwe |e HerausgeberIn |0 (DE-588)1122442068 |0 (DE-627)875668976 |0 (DE-576)170443531 |4 edt | |
700 | 1 | |a Skillicorn, David B. |e HerausgeberIn |0 (DE-588)1147709343 |0 (DE-627)1006696172 |0 (DE-576)173896456 |4 edt | |
776 | 1 | |z 9783030412517 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Open Source Intelligence and Cyber Crime |b 1st ed. 2020. |d Cham : Springer International Publishing, 2020 |h 1 Online-Ressource(V, 251 p. 88 illus., 69 illus. in color.) |w (DE-627)1726030512 |z 9783030412517 |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz1727432193inh.htm |m V:DE-576;B:DE-21 |q application/pdf |v 20201001150128 |3 Inhaltsverzeichnis |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz1727432193kla.htm |m V:DE-576;B:DE-21 |q application/pdf |v 20201001150128 |3 Klappentext |
856 | |u https://doi.org/10.1007/978-3-030-41251-7 |x doi |3 Volltext | ||
936 | r | v | |a ST 277 |b Sonstiges zur Sicherheit in der Datenverarbeitung |k Informatik |k Monografien |k Software und -entwicklung |k Sonstiges zur Sicherheit in der Datenverarbeitung |0 (DE-627)1271118971 |0 (DE-625)rvk/143643: |0 (DE-576)201118971 |
951 | |a BO | ||
ELC | |a 1 |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 374114777X | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1727432193 | ||
LOK | |0 005 20200908122726 | ||
LOK | |0 008 200819||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 21 A 901 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 938 |a 2009 |f 34 | ||
OAS | |a 1 | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 21 A 901 |