Ethical and legal issues of the use of computational intelligence techniques in computer security and computer forensics
暂无分享,去创建一个
Yingqin Zheng | Bernd Carsten Stahl | David A. Elizondo | Moira Carroll-Mayer | Kutoma Wakunuma | D. Elizondo | B. Stahl | K. Wakunuma | Yingqin Zheng | M. Carroll-Mayer
[1] John Gardner,et al. Nearly Natural Law , 2007 .
[2] Alfredo De Santis,et al. Neural Network Techniques for Proactive Password Checking , 2006, IEEE Transactions on Dependable and Secure Computing.
[3] B. Stahl. FORENSIC COMPUTING IN THE WORKPLACE: HEGEMONY, IDEOLOGY, AND THE PERFECT PANOPTICON? , 2008 .
[4] R L Simpson,et al. Ethics in the information age. , 1995, Nursing management.
[5] W. Kissick,et al. ON THE HUMAN USE OF HUMAN BEINGS , 1969, Annals of the New York Academy of Sciences.
[6] Robert Behrman,et al. Social Network Influences on Strategic Choices , 2004 .
[7] Jeroen van den Hoven,et al. Information Technology and Moral Philosophy , 2008 .
[8] G. Lăzăroiu. The Cambridge Handbook of Information and Computer Ethics , 2012 .
[9] Shouhong Wang,et al. Password Authentication Using Hopfield Neural Networks , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[10] Shaio Yan Huang,et al. Using the artificial neural network to predict fraud litigation: Some empirical evidence from emerging markets , 2009, Expert Syst. Appl..
[11] Bernd Carsten Stahl,et al. CCTV identity management and implications for criminal justice: some considerations. , 2002 .
[12] William H. Allen. Computer Forensics , 2005, IEEE Secur. Priv..
[13] Tero Vartiainen,et al. What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..
[14] Naomi Miller,et al. Risk-adjusted probability measures in portfolio optimization with coherent measures of risk , 2008, Eur. J. Oper. Res..
[15] James L. McClelland,et al. Parallel distributed processing: explorations in the microstructure of cognition, vol. 1: foundations , 1986 .
[16] B. K. L. Feia,et al. The use of self-organising maps for anomalous behaviour detection in a digital investigation , 2006 .
[17] Benjamin Kuipers,et al. Computer power and human reason , 1976, SGAR.
[18] Sue Conger,et al. The Intersection of Privacy and Security , 2009 .
[19] K. Himma. The Handbook of Information and Computer Ethics , 2007 .
[20] Paulo Salvador,et al. Framework for Zombie Detection Using Neural Networks , 2009, 2009 Fourth International Conference on Internet Monitoring and Protection.
[21] Keith Marzullo,et al. Computer Forensics in Forensis , 2008, 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering.
[22] Erin Kenneally. Gatekeeping Out of the Box: Open Source Software as a Mechanism to Assess Reliability for Digital Evidence , 2001 .
[23] Patricia A. Lafferty,et al. Texture-based steganalysis: results for color images , 2004, SPIE Optics + Photonics.
[24] Sylvie Delacroix,et al. You'd Better Be Committed: Legal Norms and Normativity , 2009 .
[25] Kirstie Ball,et al. Surveillance Society: Monitoring Everyday Life , 2001 .
[26] William S. Brown. Ontological Security, Existential Anxiety and Workplace Privacy , 2000 .
[27] Lucas D. Introna,et al. Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems , 2002, Surveillance & Society.
[28] Nicole Beebe,et al. Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results , 2007, Digit. Investig..
[29] Parag Kulkarni,et al. Intrusion Detection System using Self Organizing Maps , 2009, 2009 International Conference on Intelligent Agent & Multi-Agent Systems.
[30] Tshilidzi Marwala,et al. State of the Art Review for Applying Computational Intelligence and Machine Learning Techniques to Portfolio Optimisation , 2009, ArXiv.
[31] James L. McClelland,et al. Parallel Distributed Processing: Explorations in the Microstructure of Cognition : Psychological and Biological Models , 1986 .
[32] Lucas D. Introna. Workplace surveillance is unethical and unfair , 2002 .