New Dimensions of Information Warfare
Di Pietro, Roberto, Raponi, Simone, Caprolu, Maurantonio
- 出版商: Springer
- 出版日期: 2021-12-05
- 售價: $7,190
- 貴賓價: 9.5 折 $6,831
- 語言: 英文
- 頁數: 268
- 裝訂: Quality Paper - also called trade paper
- ISBN: 3030606201
- ISBN-13: 9783030606206
海外代購書籍(需單獨結帳)
相關主題
商品描述
Preface.AcknowledgementForewordOrganizationBook structure1. Information DisorderThe new social ecosystemThreat: disinformation campaignAttacksVaccine hesitancyImmigrationClimate changePublic naivetyAlleged political scandalsCountermeasures..Low-quality information.Fake-news detection and removal.Credibility.Spreading truth.Datasets.Malicious actorsSocial botsFake profilesAstroturfSpammersSock puppetsPolitical memesNew directionsEconomyState-sponsored CryptocurrencyThreatCollapse of the cryptocurrenciesAttacks and countermeasuresHash FunctionsOpen IssuesScenario 2: Trust in the Computational Power.Threat: New Technologies.Scenario 3: InfrastructureAttacks and CountermeasureOpen IssuesTowards a State-Sponsored CryptocurrencyBitcoin LimitationsDevelop a State-Sponsored CryptocurrencyScenario 1: Stock market forecastsThreat: Information-based manipulationA large attack surfaceAttacks and countermeasuresOpen issues and future directionsThreat: Trade-based manipulationAttacksCountermeasuresOpen issues and future directionsThreat: Algorithm-based manipulationAlgorithms taking overLoose cannons on the automation deckAttacksCountermeasuresOpen issues and future directionsOther countermeasuresThreat: Technological bias, divide, and monopolyAttacks and countermeasuresOpen issues and future directionsScenario 3: Remote stock marketThreat: Attacks against availabilityAttacks and countermeasuresThreat: Work-from-home perilsAttacksCountermeasuresOpen issues and future directionsScenario 4: Complex financial networksThreat: Systemic risk and cascading failures Measures of systemic riskEconomics and finance approachesNetwork approachesCountermeasuresOpen issues and future directionsPart.- InfrastructureCritical InfrastructureScenario: Cyber Warfare targeting Critical InfrastructuresThreat: MalwareAttacks and CountermeasuresOpen Issues and Future DirectionsScenario: A new Cyber-Physical threat from the skyThreat: DronesAttacks and CountermeasuresOpen Issues and Future DirectionsAttacks and countermeasuresOpen issues and future directionsThreat: outsourcing of securityAttacks and countermeasuresTrust in the cloudSecurity perimeterConfidentialityIntegrityAvailabilityOpen issues and future directionsTechnical sideGlossaryBibliography