𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Communications in Computer and Information Science] Global E-Security Volume 12 || A Survey of User Authentication Based on Mouse Dynamics

✍ Scribed by Jahankhani, Hamid; Revett, Kenneth; Palmer-Brown, Dominic


Book ID
121400203
Publisher
Springer Berlin Heidelberg
Year
2008
Tongue
German
Weight
202 KB
Category
Article
ISBN
354069403X

No coin nor oath required. For personal study only.

✦ Synopsis


In Today’s Society, Where Technology Is Ubiquitous, Protecting Ourselves With Firewalls Is As Important As Defending Ourselves With Firepower. New Technology Is Providing Criminals With A World Of Opportunity, While Law Enforcement Agencies All Over The World Are Struggling To Cope. E-security Is An Issue Of Global Importance. In Many Ways, Cybercrime Is No Different To More Traditional Types Of Crime – Both Involve Identifying Targets, Using Surveillance And Psychological Profiling Of Potential Victims. The Major Difference Is That The Perpetrators Of Cybercrime Are Increasingly Remote To The Scene Of Their Crime And That In Some Cases Their Victims May Not Even Realize That A Crime Is Taking Place. Knowledge Of The Techniques Being Used By Criminals And The Technology And Tra- Ing Available To Combat Them Is Essential In Fighting Cybercrime. Establishing Dialogue Between Crime-fighting Agencies, The Security Industry, Researchers And Experts Can Provide A Platform From Which E-security Can Be Examined From Several Global P- Spectives.


πŸ“œ SIMILAR VOLUMES


[Communications in Computer and Informat
✍ Yuan, Yuyu; Wu, Xu; Lu, Yueming πŸ“‚ Article πŸ“… 2013 πŸ› Springer Berlin Heidelberg 🌐 English βš– 235 KB

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics cove

[Communications in Computer and Informat
✍ Lei, Jingsheng; Wang, Fu Lee; Li, Mo; Luo, Yuan πŸ“‚ Article πŸ“… 2012 πŸ› Springer Berlin Heidelberg 🌐 English βš– 492 KB

This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organi