New Dimensions of Information Warfare by Roberto Di Pietro
Home > General > New Dimensions of Information Warfare
New Dimensions of Information Warfare

New Dimensions of Information Warfare


     0     
5
4
3
2
1



International Edition


About the Book

Preface.AcknowledgementForewordOrganizationBook structure1. Information DisorderThe new social ecosystemThreat: disinformation campaignAttacksVaccine hesitancyImmigrationClimate changePublic naivetyAlleged political scandalsCountermeasures..Low-quality information.Fake-news detection and removal.Credibility.Spreading truth.Datasets.Malicious actorsSocial botsFake profilesAstroturfSpammersSock puppetsPolitical memesNew directionsEconomyState-sponsored CryptocurrencyThreatCollapse of the cryptocurrenciesAttacks and countermeasuresHash FunctionsOpen IssuesScenario 2: Trust in the Computational Power.Threat: New Technologies.Scenario 3: InfrastructureAttacks and CountermeasureOpen IssuesTowards a State-Sponsored CryptocurrencyBitcoin LimitationsDevelop a State-Sponsored CryptocurrencyScenario 1: Stock market forecastsThreat: Information-based manipulationA large attack surfaceAttacks and countermeasuresOpen issues and future directionsThreat: Trade-based manipulationAttacksCountermeasuresOpen issues and future directionsThreat: Algorithm-based manipulationAlgorithms taking overLoose cannons on the automation deckAttacksCountermeasuresOpen issues and future directionsOther countermeasuresThreat: Technological bias, divide, and monopolyAttacks and countermeasuresOpen issues and future directionsScenario 3: Remote stock marketThreat: Attacks against availabilityAttacks and countermeasuresThreat: Work-from-home perilsAttacksCountermeasuresOpen issues and future directionsScenario 4: Complex financial networksThreat: Systemic risk and cascading failures Measures of systemic riskEconomics and finance approachesNetwork approachesCountermeasuresOpen issues and future directionsPart.- InfrastructureCritical InfrastructureScenario: Cyber Warfare targeting Critical InfrastructuresThreat: MalwareAttacks and CountermeasuresOpen Issues and Future DirectionsScenario: A new Cyber-Physical threat from the skyThreat: DronesAttacks and CountermeasuresOpen Issues and Future DirectionsAttacks and countermeasuresOpen issues and future directionsThreat: outsourcing of securityAttacks and countermeasuresTrust in the cloudSecurity perimeterConfidentialityIntegrityAvailabilityOpen issues and future directionsTechnical sideGlossaryBibliography
About the Author: Dr. Roberto Di Pietro, ACM Distinguished Scientist, is Full Professor in Cybersecurity at HBKU-CSE. Previously, he was in the capacity of Global Head Security Research at Nokia Bell Labs, Associate Professor (with tenure) of Computer Science at University of Padova, and Assistant Professor (with tenure) at University of Roma Tre. He began his career serving for 10+ years in the military---8 years as état-major senior military officer within the Italian Carabinieri Army. Overall, he has been working in the information security field for 25+ years, leading both technology-oriented and research-focused teams in the private sector, government, academia, and international organizations (United Nations HQ, EUROJUST, IAEA, WIPO). His main research interests include security and privacy for distributed systems (e.g. Blockchain technology, Cloud, IoT, online social networks), virtualization security, applied cryptography, intrusion detection, computer forensics, and data science. Other than being involved in M&A of start-up---and having founded one (exited)---, and leading as PI a few high impact international research projects, he has also matured an extensive strategic consultant experience on cybersecurity topics. He has been producing 240+ scientific papers and patents over the cited topics, has co-authored two books, edited one, and contributed to a few others. In 2011-2012 he was awarded a Chair of Excellence from University Carlos III, Madrid. In 2020 he received the Jean-Claude Laprie award for having significantly influenced the theory and practice of Dependable Computing.
Simone Raponi is currently a 3rd year Ph.D. Student in Computer Science and Engineering at Hamad Bin Khalifa University in Doha, Qatar. He is a teaching assistant of Cyber Security and an active member of the HBKU Cyber-Security Research Innovation Lab, headed by Prof. Roberto Di Pietro. He received both his Bachelor and his Master's Degree with honor in Computer Science at Sapienza, University of Rome, Italy, on topics strictly related to applied Security and Privacy. In 2018 he joined Iberdrola Qatar and Telefonica Research Barcelona for 2 months as machine learning scientist intern. His major research interests include Cybersecurity, Artificial Intelligence, and Privacy.
Maurantonio Caprolu is currently a Ph.D. student in Computer Science and Engineering at Hamad Bin Khalifa University. He is a teaching assistant of Cyber Security and an active member of the HBKU Cyber-Security Research Innovation Lab, headed by Prof. Roberto Di Pietro. He received his master's degree with honors in Computer Science at Sapienza, University of Rome, Italy, on topics strictly related to applied Security and Privacy. He worked several years as an IT consultant for Telecom Italia, Rome. In 2016, he joined as a senior programmer the European Antitrust Forensic IT Tools Project, headed by the University of Roma Tre and the Italian competition authority (AGCM). He participated at the NATO Locked Shields 2017, the world's largest and most advanced international technical live-fire cyber defense exercise, as a member of the Italian Blue Team coordinated by the Italian Minister of Defense. In 2019 he joined Iberdrola as a research assistant for a 3-month internship that aimed at integrating blockchain-based solutions in the context of smart grids. His research interests span several areas of cybersecurity, which include blockchain technologies, software-defined networking, cryptocurrencies, edge/fog architecture, and computer forensic.

Stefano received his PhD in Information Engineering from the University of Pisa in 2018. He received his Bachelor's and Master's degrees in Computer Engineering respectively in 2007 and 2013 and a post-graduate Master's degree in Big Data Analytics & Social Mining in 2016, from the University of Pisa. Currently, he is a Researcher at the Institute of Informatics and Telematics of the National Research Council (IIT-CNR) in Pisa, Italy. His professional experiences encompass both national and international collaborations with renowned institutions such as the Hamad Bin Khalifa University (Doha, Qatar), Nokia Bell Labs (Paris, France), ISTI-CNR (Pisa, Italy), and the LARTTE Laboratory of the Scuola Normale Superiore (Pisa, Italy). His interests broadly fall at the intersection of Web Science and Data Science, and include the following topics: social media analysis and mining; online social networks security; information disorder; artificial intelligence, machine learning, data science; crisis informatics. Stefano published more than 50 peer-reviewed papers on these topics on top conferences and journals in these fields. In 2018, he was selected among the winners of a SAGE Ocean Concept Grant. In 2019, he won the IEEE Computer Society Italy Section Chapter 2018 PhD Thesis Award and the IEEE Next-Generation Data Scientist Award. He was selected and invited to participate to the 8th Heidelberg Laureate Forum. He is member of the IEEE and of the ACM.


Best Sellers



Product Details
  • ISBN-13: 9783030606176
  • Publisher: Springer International Publishing
  • Publisher Imprint: Springer
  • Height: 234 mm
  • No of Pages: 251
  • Series Title: Advances in Information Security
  • Weight: 603 gr
  • ISBN-10: 3030606171
  • Publisher Date: 04 Dec 2020
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Spine Width: 16 mm
  • Width: 156 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
New Dimensions of Information Warfare
Springer International Publishing -
New Dimensions of Information Warfare
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

New Dimensions of Information Warfare

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!