Use of risk analysis in computer-aided persuasion:
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
IOS Press
©2011
|
Schriftenreihe: | NATO science for peace and security series
v.88 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Proceedings of the NATO Advanced Research Workshop on The Use of Risk Analysis to Protect Against Intelligent Threats, Antalya, Turkey, 24-26 May 2011"--Title page verso. - International conference proceedings. - Includes indexes Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f USE OF RISK ANALYSIS IN COMPUTER-AIDEDPERSUASION; Preface; Contents; Part I -- Fraud and Financial; A Framework for Modeling Network Risk; Centrality Measures in Shareholding Networks; Concealed Investment Strategy Threats; Asset Management System: Risk Analysis in Portfolio Selection using Fuzzy Logic; Using Social Networks for On-line Credit Card Fraud Analysis; Linear and Nonlinear Kernel Based Pattern Recognition: From Theory to Financial Practice; A Comparison of Classification Models on Credit Card Fraud Detection with respect to Cost-Based Performance Metrics Includes bibliographical references and indexes |
Beschreibung: | 1 Online-Ressource (viii, 337 pages) |
ISBN: | 1607508273 1607508281 9781607508274 9781607508281 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043108772 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2011 |||| o||u| ||||||eng d | ||
020 | |a 1607508273 |9 1-60750-827-3 | ||
020 | |a 1607508281 |c electronic bk. |9 1-60750-828-1 | ||
020 | |a 9781607508274 |9 978-1-60750-827-4 | ||
020 | |a 9781607508281 |c electronic bk. |9 978-1-60750-828-1 | ||
035 | |a (OCoLC)772636235 | ||
035 | |a (DE-599)BVBBV043108772 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 23 | |
110 | 2 | |a NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey> |e Verfasser |4 aut | |
245 | 1 | 0 | |a Use of risk analysis in computer-aided persuasion |c edited by Ekrem Duman and Amir F. Atiya |
264 | 1 | |a Amsterdam |b IOS Press |c ©2011 | |
300 | |a 1 Online-Ressource (viii, 337 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a NATO science for peace and security series |v v.88 | |
500 | |a "Proceedings of the NATO Advanced Research Workshop on The Use of Risk Analysis to Protect Against Intelligent Threats, Antalya, Turkey, 24-26 May 2011"--Title page verso. - International conference proceedings. - Includes indexes | ||
500 | |a Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f | ||
500 | |a USE OF RISK ANALYSIS IN COMPUTER-AIDEDPERSUASION; Preface; Contents; Part I -- Fraud and Financial; A Framework for Modeling Network Risk; Centrality Measures in Shareholding Networks; Concealed Investment Strategy Threats; Asset Management System: Risk Analysis in Portfolio Selection using Fuzzy Logic; Using Social Networks for On-line Credit Card Fraud Analysis; Linear and Nonlinear Kernel Based Pattern Recognition: From Theory to Financial Practice; A Comparison of Classification Models on Credit Card Fraud Detection with respect to Cost-Based Performance Metrics | ||
500 | |a Includes bibliographical references and indexes | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Computer networks |x Security measures |v Congresses | |
650 | 4 | |a National security |x Risk assessment |v Congresses | |
650 | 4 | |a Data protection |v Congresses | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Duman, Ekrem |e Sonstige |4 oth | |
700 | 1 | |a Atiya, Amir F. |e Sonstige |4 oth | |
710 | 2 | |a IOS Press |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422088 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028532963 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422088 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422088 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175526115409920 |
---|---|
any_adam_object | |
author_corporate | NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey> |
author_corporate_role | aut |
author_facet | NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey> |
author_sort | NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey> |
building | Verbundindex |
bvnumber | BV043108772 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)772636235 (DE-599)BVBBV043108772 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03676nmm a2200529zcb4500</leader><controlfield tag="001">BV043108772</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607508273</subfield><subfield code="9">1-60750-827-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607508281</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-60750-828-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607508274</subfield><subfield code="9">978-1-60750-827-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607508281</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-60750-828-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)772636235</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043108772</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey></subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Use of risk analysis in computer-aided persuasion</subfield><subfield code="c">edited by Ekrem Duman and Amir F. Atiya</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">©2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (viii, 337 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NATO science for peace and security series</subfield><subfield code="v">v.88</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Research Workshop on The Use of Risk Analysis to Protect Against Intelligent Threats, Antalya, Turkey, 24-26 May 2011"--Title page verso. - International conference proceedings. - Includes indexes</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">USE OF RISK ANALYSIS IN COMPUTER-AIDEDPERSUASION; Preface; Contents; Part I -- Fraud and Financial; A Framework for Modeling Network Risk; Centrality Measures in Shareholding Networks; Concealed Investment Strategy Threats; Asset Management System: Risk Analysis in Portfolio Selection using Fuzzy Logic; Using Social Networks for On-line Credit Card Fraud Analysis; Linear and Nonlinear Kernel Based Pattern Recognition: From Theory to Financial Practice; A Comparison of Classification Models on Credit Card Fraud Detection with respect to Cost-Based Performance Metrics</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and indexes</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="x">Risk assessment</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Duman, Ekrem</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Atiya, Amir F.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422088</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028532963</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422088</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422088</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043108772 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:41Z |
institution | BVB |
isbn | 1607508273 1607508281 9781607508274 9781607508281 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028532963 |
oclc_num | 772636235 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (viii, 337 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IOS Press |
record_format | marc |
series2 | NATO science for peace and security series |
spelling | NATO Advanced Research Workshop on the Use of Risk Analysis to Protect Against Intelligent Threats <2011, Antalya, Turkey> Verfasser aut Use of risk analysis in computer-aided persuasion edited by Ekrem Duman and Amir F. Atiya Amsterdam IOS Press ©2011 1 Online-Ressource (viii, 337 pages) txt rdacontent c rdamedia cr rdacarrier NATO science for peace and security series v.88 "Proceedings of the NATO Advanced Research Workshop on The Use of Risk Analysis to Protect Against Intelligent Threats, Antalya, Turkey, 24-26 May 2011"--Title page verso. - International conference proceedings. - Includes indexes Defense systems, computer networks and financial systems are increasingly subject to attack by terrorists, fraudsters and saboteurs. New challenges require concerted action from researchers to develop successful designs for computer networks that are resilient to deliberate attacks, and capacities must be built into the network to allow for quick and automatic recovery with little or no interruption or loss. This book contains contributions to the NATO Advanced Research Workshop on The Use of Risk Analysis in Computer-Aided Persuasion held in Antalya, Turkey in May 2011. The goal has been to f USE OF RISK ANALYSIS IN COMPUTER-AIDEDPERSUASION; Preface; Contents; Part I -- Fraud and Financial; A Framework for Modeling Network Risk; Centrality Measures in Shareholding Networks; Concealed Investment Strategy Threats; Asset Management System: Risk Analysis in Portfolio Selection using Fuzzy Logic; Using Social Networks for On-line Credit Card Fraud Analysis; Linear and Nonlinear Kernel Based Pattern Recognition: From Theory to Financial Practice; A Comparison of Classification Models on Credit Card Fraud Detection with respect to Cost-Based Performance Metrics Includes bibliographical references and indexes COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks Security measures Congresses National security Risk assessment Congresses Data protection Congresses (DE-588)1071861417 Konferenzschrift gnd-content Duman, Ekrem Sonstige oth Atiya, Amir F. Sonstige oth IOS Press Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422088 Aggregator Volltext |
spellingShingle | Use of risk analysis in computer-aided persuasion COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks Security measures Congresses National security Risk assessment Congresses Data protection Congresses |
subject_GND | (DE-588)1071861417 |
title | Use of risk analysis in computer-aided persuasion |
title_auth | Use of risk analysis in computer-aided persuasion |
title_exact_search | Use of risk analysis in computer-aided persuasion |
title_full | Use of risk analysis in computer-aided persuasion edited by Ekrem Duman and Amir F. Atiya |
title_fullStr | Use of risk analysis in computer-aided persuasion edited by Ekrem Duman and Amir F. Atiya |
title_full_unstemmed | Use of risk analysis in computer-aided persuasion edited by Ekrem Duman and Amir F. Atiya |
title_short | Use of risk analysis in computer-aided persuasion |
title_sort | use of risk analysis in computer aided persuasion |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks Security measures Congresses National security Risk assessment Congresses Data protection Congresses |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks Security measures Congresses National security Risk assessment Congresses Data protection Congresses Konferenzschrift |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422088 |
work_keys_str_mv | AT natoadvancedresearchworkshopontheuseofriskanalysistoprotectagainstintelligentthreats2011antalyaturkey useofriskanalysisincomputeraidedpersuasion AT dumanekrem useofriskanalysisincomputeraidedpersuasion AT atiyaamirf useofriskanalysisincomputeraidedpersuasion AT iospress useofriskanalysisincomputeraidedpersuasion |