{"title":"Border Management in Transformation","authors":"J. Wagner","doi":"10.1007/978-3-030-62728-7","DOIUrl":"https://doi.org/10.1007/978-3-030-62728-7","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123661803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correction to: Shared Images and Camera Fingerprinting May Lead to Privacy Issues","authors":"R. Rouhi, Flavio Bertini, D. Montesi","doi":"10.1007/978-3-030-39489-9_14","DOIUrl":"https://doi.org/10.1007/978-3-030-39489-9_14","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114033060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Dark Side of Interconnectivity: Social Media as a Cyber–Weapon?","authors":"S. Geraldes","doi":"10.1007/978-3-030-47511-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-47511-6_11","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive Policing in 2025: A Scenario","authors":"Kevin Macnish, David Wright, Tilimbe Jiya","doi":"10.1007/978-3-030-50613-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-50613-1_9","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121319283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Game-Theoretic Decision Making for the Resilience of Interdependent Infrastructures Exposed to Disruptions","authors":"Yiping Fang, E. Zio","doi":"10.1007/978-3-030-00024-0_6","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_6","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133459443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Henry Mwiki, T. Dargahi, A. Dehghantanha, Kim-Kwang Raymond Choo
{"title":"Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin","authors":"Henry Mwiki, T. Dargahi, A. Dehghantanha, Kim-Kwang Raymond Choo","doi":"10.1007/978-3-030-00024-0_12","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_12","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123917170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Water Treatment by Green Coagulants—Nature at Rescue","authors":"Manoj Kumar Karnena, V. Saritha","doi":"10.1007/978-3-030-76008-3_9","DOIUrl":"https://doi.org/10.1007/978-3-030-76008-3_9","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"20 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116710856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hasitha Hettiarachchi Hettiarachchige, H. Jahankhani
{"title":"Holistic Authentication Framework for Virtual Agents; UK Banking Industry","authors":"Hasitha Hettiarachchi Hettiarachchige, H. Jahankhani","doi":"10.1007/978-3-030-87166-6_10","DOIUrl":"https://doi.org/10.1007/978-3-030-87166-6_10","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117218682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Utilization of Blockchain for Enhancing Big Data Security and Veracity","authors":"S. Wibowo, A. D. Sumari","doi":"10.1007/978-3-030-35642-2_8","DOIUrl":"https://doi.org/10.1007/978-3-030-35642-2_8","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}