Detail publikace

Cybergeography and Cybersecurity

Originální název

Cybergeography and Cybersecurity

Anglický název

Cybergeography and Cybersecurity

Jazyk

en

Originální abstrakt

The lecture deals with the current knowledge in the interdisciplinary field of Cybergeography. The presented approaches describe methods for delimiting a geographical area that includes an Internet device. The general remote methods are considered; these may be used for any Internet device without knowledge of its use (mobile, fixed), available hardware resources (GPS and WiFi triangulation is not considered), and installed applications. A description of address allocation and dedicated geolocation databases is presented. The lecture goes into more detail in analysing network communication since new applications emerge in this area. The measurement-based methods include constraint-based geolocation and probabilistic modelling. Knowledge in Cybergeography is used for implementing a vast number of location-aware applications, including web content personalization and user behaviour analysis. The lecture covers cybersecurity applications dealing with the detection of on-line identity theft and credit card fraud, and verification of server authenticity.

Anglický abstrakt

The lecture deals with the current knowledge in the interdisciplinary field of Cybergeography. The presented approaches describe methods for delimiting a geographical area that includes an Internet device. The general remote methods are considered; these may be used for any Internet device without knowledge of its use (mobile, fixed), available hardware resources (GPS and WiFi triangulation is not considered), and installed applications. A description of address allocation and dedicated geolocation databases is presented. The lecture goes into more detail in analysing network communication since new applications emerge in this area. The measurement-based methods include constraint-based geolocation and probabilistic modelling. Knowledge in Cybergeography is used for implementing a vast number of location-aware applications, including web content personalization and user behaviour analysis. The lecture covers cybersecurity applications dealing with the detection of on-line identity theft and credit card fraud, and verification of server authenticity.

BibTex


@misc{BUT150801,
  author="Dan {Komosný}",
  title="Cybergeography and Cybersecurity",
  annote="The lecture deals with the current knowledge in the interdisciplinary field of Cybergeography. The presented approaches describe methods for delimiting a geographical area that includes an Internet device. The general remote methods are considered; these may be used for any Internet device without knowledge of its use (mobile, fixed), available hardware resources (GPS and WiFi triangulation is not considered), and installed applications. A description of address allocation and dedicated geolocation databases is presented. The lecture goes into more detail in analysing network communication since new applications emerge in this area. The measurement-based methods include constraint-based geolocation and probabilistic modelling. Knowledge in Cybergeography is used for implementing a vast number of location-aware applications, including web content personalization and user behaviour analysis. The lecture covers cybersecurity applications dealing with the detection of on-line identity theft and credit card fraud, and verification of server authenticity.",
  address="VUTIUM",
  chapter="150801",
  howpublished="print",
  institution="VUTIUM",
  year="2018",
  month="january",
  pages="1--32",
  publisher="VUTIUM",
  type="professorship procedure file"
}