000 06138cam a2200589Ii 4500
001 ocn931534548
003 OCoLC
005 20190328114813.0
006 m o d
007 cr cnu|||unuuu
008 151207t20162016mau ob 001 0 eng d
010 _a 2017288169
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dIDEBK
_dYDXCP
_dOCLCF
_dEBLCP
_dOPELS
_dCDX
_dB24X7
_dSTF
_dTXI
_dOCLCO
_dD6H
_dCOO
_dIDB
_dZ5A
_dDEBSZ
_dLIV
_dOCLCQ
_dMERUC
_dOCLCQ
_dU3W
_dWRM
_dOCLCQ
_dWYU
_dLOA
_dZCU
_dICG
_dCOCUF
_dVT2
_dDKC
019 _a932340309
_a966374388
_a1066446830
_a1088963499
020 _a9780128029176
_q(electronic bk.)
020 _a012802917X
_q(electronic bk.)
020 _z9780128029169
020 _a0128029161
_q(paperback)
020 _a9780128029169
035 _a(OCoLC)931534548
_z(OCoLC)932340309
_z(OCoLC)966374388
_z(OCoLC)1066446830
_z(OCoLC)1088963499
050 4 _aJF1525.I6
072 7 _aPOL
_x040020
_2bisacsh
072 7 _aPOL
_x011000
_2bisacsh
082 0 4 _a327.120285/4678
_223
245 0 0 _aAutomating open source intelligence : algorithms for OSINT /
_h[electronic resource]
_cedited by Robert Layton, Paul A. Watters.
264 1 _aWaltham, MA :
_bElsevier,
_c2016.
264 4 _c�2016
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aSyngress advanced topics in information security
504 _aIncludes bibliographical references and index.
588 0 _aVendor-supplied metadata.
505 0 _aCover; Title Page ; Copyright Page; Contents; List of Contributors; Chapter 1 -- The Automating of Open Source Intelligence; The Commercial Angle; Algorithms; References; Chapter 2 -- Named Entity Resolution in Social Media; Introduction; Evaluating Semantic Processing Performance; Characterizing Semantic Processing Errors; Meaning Loss in Biblical Proverbs: A Case Study; Models for Improving Semantic Processing Performance; Discussion; References; Chapter 3 -- Relative Cyberattack Attribution; Introduction; Basic Attack Structure; Anonymization on the Internet; Weaknesses in Anonymization.
505 8 _aAttribution as a ConceptAbsolute Attribution; Relative Attribution; Relative attribution concepts; Inherent versus Learnt Behaviors; Hiding Behavior; Consistency of Behavior; Relative Attribution Techniques; Authorship Analysis; Limitations and Issues; Research Streams; Conclusions; References; Chapter 4 -- Enhancing Privacy to Defeat Open Source Intelligence; Introduction; Scenario; Requirements and Threats; Preliminaries; The PIEMCP; Formal Security Analysis with CPN; Attack Scenarios; Verification Results; Removing Trusted ARM; Performance Analysis of FSSO-PIEMC.
505 8 _aComparison to Existing ApproachConclusion and future work; References; Chapter 5 -- Preventing Data Exfiltration: Corporate Patterns and Practices; What is Happening Around the World?; What is Happening in New Zealand?; Specifying the Problem; Problems Arising by Implementing Censorship; So, what should be done?; Summary; References; Chapter 6 -- Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground; Introduction; Advertising and risk; The digital millennium copyright act (DMCA); Chilling Effects Database; Google Transparency Report.
505 8 _aMainstream advertising and how piracy is fundedHigh-Risk Advertising and their links to piracy websites; High-Risk Advertising: Case Studies in Canada; High-risk advertising: case studies in Australia; High-Risk Advertising: Case studies in New Zealand; Research Challenges; References; Chapter 7 -- Graph Creation and Analysis for Linking Actors: Application to Social Data; Introduction; The Social Network Model; A Brief History of Graphs and Social Networks; Conceptual Framework; Graph Creation Techniques; Data Gathering; Defining and Computing Relationships; Disambiguation Techniques.
505 8 _aGraph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction.
520 _aThis book presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. It presents a coherent set of methods and processes for automating OSINT; focuses on algorithms and applications allowing the practitioner to get up and running quickly; includes fully developed case studies on the digital underground and predicting crime through OSINT; discusses the ethical considerations when using publicly available online data. --
_cEdited summary from book.
650 0 _aOpen source intelligence.
650 7 _aPOLITICAL SCIENCE
_xGovernment
_xInternational.
_2bisacsh
650 7 _aPOLITICAL SCIENCE
_xInternational Relations
_xGeneral.
_2bisacsh
650 7 _aOpen source intelligence.
_2fast
_0(OCoLC)fst01739916
655 4 _aElectronic books.
655 7 _aElectronic books.
_2lcgft
700 1 _aLayton, Robert,
_d1986-
_eeditor.
700 1 _aWatters, Paul A.,
_eeditor.
776 0 8 _iPrint version:
_aLayton, Robert.
_tAutomating Open Source Intelligence : Algorithms for OSINT.
_d: Elsevier Science, �2015
830 0 _aSyngress advanced topics in information security.
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128029169
999 _c247243
_d247243