000938831 000__ 03408cam\a2200445Ki\4500 000938831 001__ 938831 000938831 005__ 20230306152003.0 000938831 006__ m\\\\\o\\d\\\\\\\\ 000938831 007__ cr\un\nnnunnun 000938831 008__ 200806s2020\\\\sz\\\\\\o\\\\\000\0\eng\d 000938831 019__ $$a1182869635 000938831 020__ $$a9783030412517$$q(electronic book) 000938831 020__ $$a3030412512$$q(electronic book) 000938831 020__ $$z3030412504 000938831 020__ $$z9783030412500 000938831 035__ $$aSP(OCoLC)on1182512844 000938831 035__ $$aSP(OCoLC)1182512844$$z(OCoLC)1182869635 000938831 040__ $$aYDX$$beng$$cYDX$$dDKU$$dOCLCO$$dYDXIT$$dEBLCP 000938831 049__ $$aISEA 000938831 050_4 $$aQA76.9.A25$$bO64 2020 000938831 08204 $$a005.8$$223 000938831 24500 $$aOpen source intelligence and cyber crime :$$bsocial media analytics. 000938831 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2020] 000938831 300__ $$a1 online resource 000938831 336__ $$atext$$btxt$$2rdacontent 000938831 337__ $$acomputer$$bc$$2rdamedia 000938831 338__ $$aonline resource$$bcr$$2rdacarrier 000938831 4901_ $$aLecture Notes in Social Networks Ser. 000938831 50580 $$tProtectin the web from misinformation /$$rFrancesca Spezzano, Indhumathi Gurunathan --$$tStudying the weaponization of social media : case studies of anti-NATO disinformation campaigns /$$rKatrin Galeano, Rick Galeano, Samer Al-Khateeb, Nitin Agarwal --$$tYou are known by your friends : leveraging network metrics for bot detection in Twitter /$$rDavid M. Beskow, Kathleen M. Carley --$$tBeyond the Silk Road : assessing illicit drug marketplaces on the public web /$$rRichard Frank, Alexander Mikhaylov --$$tInferring systemic nets with applications to Islamist forums /$$rDavid B. Skillicorn, N. Alsadhan --$$tTwitter bots and the Swedish election /$$rJohan Fernquist, Lisa Kaati, Ralph Schroeder, Nazar Akrami, Katie Cohen --$$tCognitively-inspired inference for malware task identification /$$rEric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson --$$tSocial media for mental health : data, methods, and findings /$$rNur Shazwani Kamarudin, Ghazaleh Beigi, Lydia Manikonda, Huan Liu --$$tAutomated text analysis for intelligence purposes : a psychological operations case study /$$rStefan Varga, Joel Brynielsson, Andreas Horndahl, Magnus Rosell. 000938831 506__ $$aAccess limited to authorized users. 000938831 520__ $$aThis book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected. Readers will encounter the latest advances in cutting-edge data mining, machine learning and predictive analytics combined with natural language processing and social network analysis to detect, disrupt, and neutralize cyber and physical threats. Chapters contain state-of-the-art social media analytics and open source intelligence research trends. This multidisciplinary volume will appeal to students, researchers, and professionals working in the fields of open source intelligence, cyber crime and social network analytics. --$$cProvided by publisher. 000938831 650_0 $$aSocial media$$xSecurity measures. 000938831 650_0 $$aComputer security. 000938831 650_0 $$aComputational intelligence. 000938831 77608 $$iPrint version: $$z3030412504$$z9783030412500$$w(OCoLC)1137843316 000938831 830_0 $$aLecture Notes in Social Networks Ser. 000938831 852__ $$bebk 000938831 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-41251-7$$zOnline Access$$91397441.1 000938831 909CO $$ooai:library.usi.edu:938831$$pGLOBAL_SET 000938831 980__ $$aEBOOK 000938831 980__ $$aBIB 000938831 982__ $$aEbook 000938831 983__ $$aOnline 000938831 994__ $$a92$$bISE